Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1545679
MD5:c5c8202cf33c1c61d4463d53aa3748e5
SHA1:be46a2f36d213ed714a9f60f73e577d3884df9a4
SHA256:ca80960301e0e4d399cdd5f9b93395b0d398290e0978926d1620437e19e0e955
Tags:exeuser-Bitsight
Infos:

Detection

Credential Flusher
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Credential Flusher
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Connects to many different domains
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
OS version to string mapping found (often used in BOTs)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • file.exe (PID: 7352 cmdline: "C:\Users\user\Desktop\file.exe" MD5: C5C8202CF33C1C61D4463D53AA3748E5)
    • taskkill.exe (PID: 7368 cmdline: taskkill /F /IM firefox.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7376 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 7472 cmdline: taskkill /F /IM chrome.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7480 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 7536 cmdline: taskkill /F /IM msedge.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7544 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 7600 cmdline: taskkill /F /IM opera.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7608 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 7664 cmdline: taskkill /F /IM brave.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7672 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • firefox.exe (PID: 7728 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • firefox.exe (PID: 7760 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
    • firefox.exe (PID: 7776 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 8020 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2276 -parentBuildID 20230927232528 -prefsHandle 2216 -prefMapHandle 2208 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a46847d0-9293-4bac-8415-4fa2947c8e97} 7776 "\\.\pipe\gecko-crash-server-pipe.7776" 1ccdad6d510 socket MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 7604 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2696 -parentBuildID 20230927232528 -prefsHandle 4228 -prefMapHandle 4224 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7cff00d-f0b1-495f-9d3f-92f956d45c2c} 7776 "\\.\pipe\gecko-crash-server-pipe.7776" 1ccece2fb10 rdd MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 7616 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4952 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4956 -prefMapHandle 4904 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ff0ebe7f-fa1c-41ff-ae44-07a5d0ab7bae} 7776 "\\.\pipe\gecko-crash-server-pipe.7776" 1ccec341110 utility MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: file.exe PID: 7352JoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: file.exeReversingLabs: Detection: 47%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
    Source: file.exeJoe Sandbox ML: detected
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49743 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.4:49745 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.4:49752 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49758 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49764 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49763 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49773 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 151.101.193.91:443 -> 192.168.2.4:49775 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49774 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49779 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49778 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49780 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49781 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49820 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49819 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49818 version: TLS 1.2
    Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdbV source: gmpopenh264.dll.tmp.13.dr
    Source: Binary string: pnrpnsp.pdb source: firefox.exe, 0000000D.00000003.1821347049.000001CCEA493000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdb source: gmpopenh264.dll.tmp.13.dr
    Source: Binary string: pnrpnsp.pdbUGP source: firefox.exe, 0000000D.00000003.1821347049.000001CCEA493000.00000004.00000020.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0071DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0071DBBE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007268EE FindFirstFileW,FindClose,0_2_007268EE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0072698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0072698F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0071D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0071D076
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0071D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0071D3A9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00729642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00729642
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0072979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0072979D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00729B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00729B2B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00725C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00725C97
    Source: firefox.exeMemory has grown: Private usage: 1MB later: 231MB
    Source: unknownNetwork traffic detected: DNS query count 31
    Source: Joe Sandbox ViewIP Address: 34.149.100.209 34.149.100.209
    Source: Joe Sandbox ViewIP Address: 34.117.188.166 34.117.188.166
    Source: Joe Sandbox ViewIP Address: 151.101.193.91 151.101.193.91
    Source: Joe Sandbox ViewIP Address: 34.160.144.191 34.160.144.191
    Source: Joe Sandbox ViewJA3 fingerprint: fb0aa01abe9d8e4037eb3473ca6e2dca
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0072CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_0072CE44
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: firefox.exe, 0000000D.00000003.1818319765.000001CCF6D4A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878692758.0000062E54203000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: *://www.facebook.com/* equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1878692758.0000062E54203000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: *://www.facebook.com/*Z equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1818319765.000001CCF6D4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: *://www.youtube.com/* equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1817611864.000001CCF2D3F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1887766640.000001CCF2D4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8*://www.facebook.com/* equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1881342024.000001CCF7B66000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1814571172.000001CCF7B66000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8*://www.youtube.com/* equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1815252044.000001CCF6B7E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1824244835.000001CCF6EBF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1815252044.000001CCF6BB5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8https://www.facebook.com/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1815252044.000001CCF6B7E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1824244835.000001CCF6EBF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1815252044.000001CCF6BB5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8https://www.youtube.com/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1817611864.000001CCF2D3F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902551446.000001CCEC09A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1887766640.000001CCF2D4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8www.facebook.com equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1814571172.000001CCF7B66000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1815252044.000001CCF6BCC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8www.youtube.com equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1894709494.000001CCEE559000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: `https://www.facebook.com/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1894709494.000001CCEE559000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: `https://www.youtube.com/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1815252044.000001CCF6B7E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1824244835.000001CCF6EBF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1815252044.000001CCF6BB5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1815252044.000001CCF6B7E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1824244835.000001CCF6EBF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1815252044.000001CCF6BB5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 00000010.00000002.2939224125.0000024FC4C03000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2938434541.000001AF6E80C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 00000010.00000002.2939224125.0000024FC4C03000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2938434541.000001AF6E80C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.twitter.com (Twitter)
    Source: firefox.exe, 00000010.00000002.2939224125.0000024FC4C03000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2938434541.000001AF6E80C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 00000010.00000002.2939224125.0000024FC4C03000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/&O equals www.facebook.com (Facebook)
    Source: firefox.exe, 00000010.00000002.2939224125.0000024FC4C03000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/&O equals www.twitter.com (Twitter)
    Source: firefox.exe, 00000010.00000002.2939224125.0000024FC4C03000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/&O equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1824244835.000001CCF6EBF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1818319765.000001CCF6D4E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858689624.000001CCF6EBF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: moz-extension://a581a2f1-688c-434b-8db8-16166b1993d9/injections/js/bug1842437-www.youtube.com-performance-now-precision.js equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1884262283.000001CCF34F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1817611864.000001CCF2D3F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902551446.000001CCEC09A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.facebook.com equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1878692758.0000062E54203000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.facebook.comZ equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1814571172.000001CCF7B66000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1815252044.000001CCF6BCC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.youtube.com equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1884262283.000001CCF34F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886215413.000001CCF34F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1897446962.000001CCF34F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.youtube.com- equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1896907300.000001CCEC34C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: x*://www.facebook.com/platform/impression.php* equals www.facebook.com (Facebook)
    Source: global trafficDNS traffic detected: DNS query: prod.classify-client.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: youtube.com
    Source: global trafficDNS traffic detected: DNS query: detectportal.firefox.com
    Source: global trafficDNS traffic detected: DNS query: prod.detectportal.prod.cloudops.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: contile.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: prod.balrog.prod.cloudops.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: spocs.getpocket.com
    Source: global trafficDNS traffic detected: DNS query: prod.ads.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: content-signature-2.cdn.mozilla.net
    Source: global trafficDNS traffic detected: DNS query: prod.content-signature-chains.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: example.org
    Source: global trafficDNS traffic detected: DNS query: ipv4only.arpa
    Source: global trafficDNS traffic detected: DNS query: shavar.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: push.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: telemetry-incoming.r53-2.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: firefox.settings.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: prod.remote-settings.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: support.mozilla.org
    Source: global trafficDNS traffic detected: DNS query: us-west1.prod.sumo.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: www.youtube.com
    Source: global trafficDNS traffic detected: DNS query: www.facebook.com
    Source: global trafficDNS traffic detected: DNS query: www.wikipedia.org
    Source: global trafficDNS traffic detected: DNS query: dyna.wikimedia.org
    Source: global trafficDNS traffic detected: DNS query: star-mini.c10r.facebook.com
    Source: global trafficDNS traffic detected: DNS query: youtube-ui.l.google.com
    Source: global trafficDNS traffic detected: DNS query: www.reddit.com
    Source: global trafficDNS traffic detected: DNS query: twitter.com
    Source: global trafficDNS traffic detected: DNS query: reddit.map.fastly.net
    Source: global trafficDNS traffic detected: DNS query: services.addons.mozilla.org
    Source: global trafficDNS traffic detected: DNS query: normandy.cdn.mozilla.net
    Source: global trafficDNS traffic detected: DNS query: normandy-cdn.services.mozilla.com
    Source: firefox.exe, 0000000D.00000003.1860635516.000001CCEEA93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://127.0.0.1:
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: firefox.exe, 0000000D.00000003.1796685952.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1798151613.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
    Source: firefox.exe, 0000000D.00000003.1796685952.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1798151613.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
    Source: firefox.exe, 0000000D.00000003.1796685952.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1798151613.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
    Source: firefox.exe, 0000000D.00000003.1796685952.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1798151613.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
    Source: firefox.exe, 0000000D.00000003.1794479388.000001CCEA478000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1793076331.000001CCEA476000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/Dih
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
    Source: firefox.exe, 0000000D.00000003.1821492878.000001CCEA48E000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1823262403.000001CCEA48E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.di
    Source: firefox.exe, 0000000D.00000003.1796685952.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1798151613.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digic
    Source: firefox.exe, 0000000D.00000003.1793076331.000001CCEA476000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/
    Source: firefox.exe, 0000000D.00000003.1796685952.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1798151613.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
    Source: firefox.exe, 0000000D.00000003.1796685952.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1798151613.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
    Source: firefox.exe, 0000000D.00000003.1796685952.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1798151613.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SI
    Source: firefox.exe, 0000000D.00000003.1796685952.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1798151613.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
    Source: firefox.exe, 0000000D.00000003.1793076331.000001CCEA476000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-Y
    Source: firefox.exe, 0000000D.00000003.1796685952.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1798151613.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
    Source: firefox.exe, 0000000D.00000003.1796685952.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1798151613.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: firefox.exe, 0000000D.00000003.1796685952.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1798151613.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
    Source: firefox.exe, 0000000D.00000003.1825382979.000001CCF6E47000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1899628478.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858689624.000001CCF6EB5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891375784.000001CCF6EB5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com
    Source: firefox.exe, 0000000D.00000003.1888849279.000001CCEC9B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/
    Source: firefox.exe, 0000000D.00000003.1864007654.000001CCECFC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/canonical.html
    Source: firefox.exe, 0000000D.00000003.1864706745.000001CCECEDF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1817064099.000001CCF3054000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1815252044.000001CCF6B8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/success.txt?ipv4
    Source: firefox.exe, 0000000D.00000003.1863904433.000001CCED0E4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1815252044.000001CCF6B8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886215413.000001CCF34CA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1897446962.000001CCF34CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/success.txt?ipv6
    Source: firefox.exe, 0000000D.00000003.1859708026.000001CCF3047000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://json-schema.org/draft-04/schema#
    Source: firefox.exe, 0000000D.00000003.1859708026.000001CCF3047000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://json-schema.org/draft-06/schema#
    Source: firefox.exe, 0000000D.00000003.1859708026.000001CCF3047000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://json-schema.org/draft-07/schema#-
    Source: firefox.exe, 0000000D.00000003.1859708026.000001CCF3047000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1844127302.000001CCEBF8D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1840945747.000001CCEBF77000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mozilla.org
    Source: firefox.exe, 0000000D.00000003.1879175810.00002DE7C6B03000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1879002579.00000DAB99A03000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mozilla.org/
    Source: firefox.exe, 0000000D.00000003.1879175810.00002DE7C6B03000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1879002579.00000DAB99A03000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mozilla.org/0
    Source: firefox.exe, 0000000D.00000003.1820483312.000001CCEAD8D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1838138758.000001CCEC61D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1838757378.000001CCEC6A1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1821832515.000001CCEC263000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1890595471.000001CCEADD9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1815102465.000001CCF6CAB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1898150951.000001CCF2BB5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1825920628.000001CCF2C19000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1828093438.000001CCEC245000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1828093438.000001CCEC295000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1730753730.000001CCEA868000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1828093438.000001CCEC248000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1880388264.000001CCEC50A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1736515083.000001CCEB642000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1843026642.000001CCEC258000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885214047.000001CCEADD3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1820483312.000001CCEADEF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1861720281.000001CCEE02B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765647907.000001CCED4DB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834385858.000001CCEC62B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1828093438.000001CCEC29C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mozilla.org/MPL/2.0/.
    Source: firefox.exe, 0000000D.00000003.1879175810.00002DE7C6B03000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1879002579.00000DAB99A03000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mozilla.org/Z
    Source: firefox.exe, 0000000D.00000003.1796685952.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1798151613.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
    Source: firefox.exe, 0000000D.00000003.1796685952.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1798151613.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1794479388.000001CCEA478000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1793076331.000001CCEA476000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: firefox.exe, 0000000D.00000003.1796685952.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1798151613.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1794479388.000001CCEA478000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1793076331.000001CCEA476000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ocsp.digicert.com0N
    Source: firefox.exe, 0000000D.00000003.1796685952.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1798151613.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ocsp.thawte.com0
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
    Source: firefox.exe, 0000000D.00000003.1796685952.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1798151613.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1794479388.000001CCEA478000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1793076331.000001CCEA476000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://www.mozilla.com0
    Source: firefox.exe, 0000000D.00000003.1859653712.000001CCF5190000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/2005/app-updatex
    Source: firefox.exe, 0000000D.00000003.1766631178.000001CCECF60000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864590611.000001CCECF60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul
    Source: firefox.exe, 0000000D.00000003.1767584688.000001CCEB867000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xulchrome://global/content/elements/notifi
    Source: firefox.exe, 0000000D.00000003.1766631178.000001CCECF60000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864590611.000001CCECF60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xulsj
    Source: mozilla-temp-41.13.drString found in binary or memory: http://www.videolan.org/x264.html
    Source: firefox.exe, 0000000D.00000003.1817358221.000001CCF303D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://youtube.com/
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.malware-error.mozilla.com/?url=
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.phish-error.mozilla.com/?url=
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.phish-report.mozilla.com/?url=
    Source: firefox.exe, 0000000D.00000003.1903348487.000001CCEB467000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://MD8.mozilla.org/1/m
    Source: firefox.exe, 0000000D.00000003.1817064099.000001CCF3054000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.duckduckgo.com/ac/
    Source: firefox.exe, 0000000D.00000003.1862544568.000001CCED69F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.bellmedia.c
    Source: firefox.exe, 0000000D.00000003.1883999273.000001CCF65B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com
    Source: firefox.exe, 0000000D.00000003.1893543778.000001CCF2B34000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1883286244.000001CCF683A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com/
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com/settings/clients
    Source: firefox.exe, 0000000D.00000003.1817611864.000001CCF2D7A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1887766640.000001CCF2D7A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765580133.000001CCF2D7A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.firefox.comK
    Source: firefox.exe, 0000000D.00000003.1842016697.000001CCED396000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1787996171.000001CCF6D0D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1850538776.000001CCED396000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1789166457.000001CCED396000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1838211534.000001CCEC6CD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1851351807.000001CCEC6CE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1850948720.000001CCF6D0D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1766631178.000001CCECFC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864007654.000001CCECFC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1815252044.000001CCF6B8C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/challenge/pwd
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/language-tools/
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/search-engines/
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/search?q=%TERMS%&platform=%OS%&appver=%VERSION%
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/themes
    Source: firefox.exe, 0000000D.00000003.1884262283.000001CCF34F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886215413.000001CCF34F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1897446962.000001CCF34F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/enhancer-for-youtube/
    Source: firefox.exe, 0000000D.00000003.1884262283.000001CCF34F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886215413.000001CCF34F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1897446962.000001CCF34F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/facebook-container/
    Source: firefox.exe, 0000000D.00000003.1884262283.000001CCF34F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886215413.000001CCF34F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1897446962.000001CCF34F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
    Source: firefox.exe, 0000000D.00000003.1884262283.000001CCF34F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886215413.000001CCF34F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1897446962.000001CCF34F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/to-google-translate/
    Source: firefox.exe, 0000000D.00000003.1884262283.000001CCF34F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886215413.000001CCF34F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1897446962.000001CCF34F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/wikipedia-context-menu-search/
    Source: firefox.exe, 0000000D.00000003.1865500849.000001CCEC7D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ads.stickyadstv.com/firefox-etp
    Source: firefox.exe, 0000000D.00000003.1817358221.000001CCF303D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1887377623.000001CCF303D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://amazon.com/
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://api.accounts.firefox.com/v1
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://apps.apple.com/app/firefox-private-safe-browser/id989804926
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://apps.apple.com/us/app/firefox-private-network-vpn/id1489407738
    Source: firefox.exe, 0000000D.00000003.1817064099.000001CCF3054000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org
    Source: firefox.exe, 0000000D.00000003.1899628478.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/3/GMP/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%OS_VER
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/3/SystemAddons/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL
    Source: firefox.exe, 0000000D.00000003.1816903820.000001CCF6822000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1860635516.000001CCEEA93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1883847448.000001CCF6823000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/6/Firefox/118.0.1/20230927232528/WINNT_x86_64-msvc-x64/en-US/release
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://blocked.cdn.mozilla.net/
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://blocked.cdn.mozilla.net/%blockID%.html
    Source: firefox.exe, 0000000F.00000002.2938954967.0000022DD35E8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2939224125.0000024FC4CE8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2941877242.000001AF6EB03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
    Source: firefox.exe, 0000000F.00000002.2938954967.0000022DD35E8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2939224125.0000024FC4CE8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2941877242.000001AF6EB03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
    Source: firefox.exe, 0000000D.00000003.1897802935.000001CCF3405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mo
    Source: firefox.exe, 0000000D.00000003.1776663554.000001CCEB198000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1778441389.000001CCEB15D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1189266
    Source: firefox.exe, 0000000D.00000003.1776663554.000001CCEB198000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1778441389.000001CCEB15D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
    Source: firefox.exe, 0000000D.00000003.1776663554.000001CCEB198000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1778441389.000001CCEB15D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1207993
    Source: firefox.exe, 0000000D.00000003.1776663554.000001CCEB198000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1778441389.000001CCEB15D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
    Source: firefox.exe, 0000000D.00000003.1776663554.000001CCEB198000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1778441389.000001CCEB15D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
    Source: firefox.exe, 0000000D.00000003.1776663554.000001CCEB198000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1778441389.000001CCEB15D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
    Source: firefox.exe, 0000000D.00000003.1880388264.000001CCEC50A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1694699#c21
    Source: firefox.exe, 0000000D.00000003.1776663554.000001CCEB198000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1778441389.000001CCEB15D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=792480
    Source: firefox.exe, 0000000D.00000003.1778441389.000001CCEB15D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=793869
    Source: firefox.exe, 0000000D.00000003.1776663554.000001CCEB198000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1778441389.000001CCEB15D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=809550
    Source: firefox.exe, 0000000D.00000003.1776663554.000001CCEB198000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1778441389.000001CCEB15D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=840161
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
    Source: firefox.exe, 0000000D.00000003.1817611864.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727714679.000001CCEA85A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727494060.000001CCEA83C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727055728.000001CCEA600000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727285035.000001CCEA81F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://completion.amazon.com/search/complete?q=
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://content.cdn.mozilla.net
    Source: firefox.exe, 0000000F.00000002.2938954967.0000022DD35E8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2939224125.0000024FC4CE8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2941877242.000001AF6EB03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
    Source: firefox.exe, 0000000F.00000002.2938954967.0000022DD35E8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2939224125.0000024FC4CE8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2941877242.000001AF6EB03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
    Source: firefox.exe, 0000000D.00000003.1893543778.000001CCF2B34000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com
    Source: firefox.exe, 0000000D.00000003.1887766640.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com/
    Source: firefox.exe, 0000000D.00000003.1887766640.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com/v1/tiles
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://coverage.mozilla.org
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://crash-stats.mozilla.org/report/index/
    Source: firefox.exe, 0000000D.00000003.1825920628.000001CCF2C2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://crbug.com/993268
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://dap-02.api.divviup.org
    Source: firefox.exe, 0000000D.00000003.1816286414.000001CCF683A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1818319765.000001CCF6D4A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1883286244.000001CCF683A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://datastudio.google.com/embed/reporting/
    Source: firefox.exe, 0000000D.00000003.1821832515.000001CCEC263000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1843026642.000001CCEC263000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1773451072.000001CCEC266000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1890381759.000001CCEC269000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Mozilla/Tech/XPCOM/Reference/Interface/nsIEffectiveTLDServi
    Source: firefox.exe, 0000000D.00000003.1825920628.000001CCF2C2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/API/ElementCSSInlineStyle/style#setting_styles)
    Source: firefox.exe, 0000000D.00000003.1825920628.000001CCF2C2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Statements/for-await...of
    Source: firefox.exe, 0000000D.00000003.1825920628.000001CCF2C2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://developers.google.com/safe-browsing/v4/advisory
    Source: firefox.exe, 0000000D.00000003.1817064099.000001CCF3054000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1817523115.000001CCF301A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1859708026.000001CCF301F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842878406.000001CCEC54C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/
    Source: firefox.exe, 0000000D.00000003.1767584688.000001CCEB867000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/y
    Source: firefox.exe, 0000000D.00000003.1732553585.000001CCE8433000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734328595.000001CCE841D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734572109.000001CCE8433000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://e.mail.ru/cgi-bin/sentmsg?mailto=%s
    Source: firefox.exe, 0000000D.00000003.1732553585.000001CCE8433000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734328595.000001CCE841D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734572109.000001CCE8433000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://email.seznam.cz/newMessageScreen?mailto=%s
    Source: firefox.exe, 00000011.00000002.2938434541.000001AF6E813000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox-api-proxy.cdn.mozilla.net/
    Source: firefox.exe, 0000000D.00000003.1767912480.000001CCEBF42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/706c7a85-cf23-442e-8a9
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://firefox-source-docs.mozilla.org/networking/dns/trr-skip-reasons.html#
    Source: firefox.exe, 0000000D.00000003.1815252044.000001CCF6BFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox.settings.services.mozilla.com
    Source: firefox.exe, 0000000D.00000003.1883286244.000001CCF68D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox.settings.services.mozilla.com/
    Source: firefox.exe, 0000000D.00000003.1815252044.000001CCF6B8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902347555.000001CCEC0C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://fpn.firefox.com/browser?utm_source=firefox-desktop&utm_medium=referral&utm_campaign=about-pr
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://ftp.mozilla.org/pub/labs/devtools/adb-extension/#OS#/adb-extension-latest-#OS#.xpi
    Source: firefox.exe, 00000011.00000002.2938434541.000001AF6E813000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/
    Source: firefox.exe, 0000000D.00000003.1887766640.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1899628478.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2939224125.0000024FC4CC7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2938434541.000001AF6E8C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
    Source: firefox.exe, 0000000D.00000003.1894345341.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1772246830.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1899628478.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2939224125.0000024FC4CC7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2938434541.000001AF6E8C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
    Source: firefox.exe, 0000000D.00000003.1899628478.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2939224125.0000024FC4C2F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2938434541.000001AF6E830000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=$apiKey&layout_variant=bas
    Source: firefox.exe, 0000000D.00000003.1765465610.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1817611864.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1887766640.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/career?utm_source=pocket-newtabL
    Source: firefox.exe, 0000000D.00000003.1765465610.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1817611864.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1887766640.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/entertainment?utm_source=pocket-newtabC
    Source: firefox.exe, 0000000D.00000003.1765465610.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1817611864.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1887766640.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/food?utm_source=pocket-newtabA
    Source: firefox.exe, 0000000D.00000003.1765465610.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1817611864.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1887766640.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/health?utm_source=pocket-newtabE
    Source: firefox.exe, 0000000D.00000003.1765465610.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1817611864.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1887766640.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/science?utm_source=pocket-newtabG
    Source: firefox.exe, 0000000D.00000003.1765465610.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1817611864.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1887766640.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/self-improvement?utm_source=pocket-newtab?
    Source: firefox.exe, 0000000D.00000003.1765465610.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1817611864.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1887766640.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/technology?utm_source=pocket-newtabN
    Source: firefox.exe, 00000010.00000002.2939224125.0000024FC4CC7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2938434541.000001AF6E8C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/trending?src=fx_new_tab
    Source: firefox.exe, 0000000D.00000003.1894345341.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1772246830.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1899628478.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/trending?src=fx_new_tabL
    Source: firefox.exe, 0000000D.00000003.1765465610.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1817611864.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1887766640.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore?utm_source=pocket-newtabI
    Source: firefox.exe, 0000000D.00000003.1887766640.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/firefox/new_tab_learn_more
    Source: firefox.exe, 0000000D.00000003.1765465610.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1817611864.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1887766640.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/firefox/new_tab_learn_more/
    Source: firefox.exe, 00000010.00000002.2939224125.0000024FC4CC7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2938434541.000001AF6E8C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendations
    Source: firefox.exe, 0000000D.00000003.1894345341.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1772246830.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1899628478.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendationsS
    Source: firefox.exe, 0000000D.00000003.1894345341.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1772246830.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1899628478.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendationsS7
    Source: firefox.exe, 0000000D.00000003.1894345341.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1772246830.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1899628478.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/v3/newtab/layout?version=1&consumer_key=$apiKey&layout_variant=basic
    Source: firefox.exe, 0000000D.00000003.1825920628.000001CCF2C2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/google/closure-compiler/issues/3177
    Source: firefox.exe, 0000000D.00000003.1825920628.000001CCF2C19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query-all.ts
    Source: firefox.exe, 0000000D.00000003.1825920628.000001CCF2C19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query.ts
    Source: firefox.exe, 0000000D.00000003.1825920628.000001CCF2C2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/lit/lit/issues/1266
    Source: firefox.exe, 0000000D.00000003.1825920628.000001CCF2C2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/microsoft/TypeScript/issues/338).
    Source: firefox.exe, 0000000D.00000003.1727934759.000001CCEA877000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727714679.000001CCEA85A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727494060.000001CCEA83C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727055728.000001CCEA600000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727285035.000001CCEA81F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mozilla-services/screenshots
    Source: firefox.exe, 0000000D.00000003.1894345341.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1772246830.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1899628478.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/zertosh/loose-envify)
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://helper1.dap.cloudflareresearch.com/v02
    Source: firefox.exe, 0000000D.00000003.1879002579.00000DAB99A03000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864908272.000001CCEC9B5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1888849279.000001CCEC9B5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1778533814.000001CCEB179000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ib.absa.co.za/
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://ideas.mozilla.org/
    Source: firefox.exe, 0000000D.00000003.1883999273.000001CCF65B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/apps/oldsyncS
    Source: firefox.exe, 0000000D.00000003.1896162879.000001CCEC3BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/apps/relay
    Source: firefox.exe, 0000000D.00000003.1883999273.000001CCF65B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/cmd/H
    Source: firefox.exe, 0000000D.00000003.1883999273.000001CCF65B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/cmd/HCX
    Source: firefox.exe, 0000000D.00000003.1883999273.000001CCF65B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/ids/ecosystem_telemetryU
    Source: firefox.exe, 0000000D.00000003.1883999273.000001CCF65B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/ids/ecosystem_telemetryUFj
    Source: firefox.exe, 0000000D.00000003.1765465610.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1817611864.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1887766640.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://img-getpocket.cdn.mozilla.net/X
    Source: prefs-1.js.13.drString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
    Source: firefox.exe, 0000000D.00000003.1814571172.000001CCF7B51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886215413.000001CCF34CA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1897446962.000001CCF34CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org
    Source: firefox.exe, 00000011.00000002.2938434541.000001AF6E8F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit
    Source: firefox.exe, 0000000D.00000003.1897446962.000001CCF34CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/firefox-desktop/events/1/a851322a-056d-4762-b6cb-e0d6b
    Source: firefox.exe, 0000000D.00000003.1815102465.000001CCF6CAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/firefox-desktop/messaging-system/1/a5d6ec76-765c-4778-
    Source: firefox.exe, 0000000D.00000003.1883999273.000001CCF6548000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/firefox-desktop/metrics/1/e62be766-f33d-46d5-89be-17ab
    Source: firefox.exe, 0000000D.00000003.1824244835.000001CCF6EBF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858689624.000001CCF6EBF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891375784.000001CCF6EC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/messaging-system/undesired-events/1/5fc3dfa2-cb94-4291
    Source: firefox.exe, 0000000D.00000003.1824244835.000001CCF6EBF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858689624.000001CCF6EBF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891375784.000001CCF6EC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/messaging-system/undesired-events/1/9800fd3b-167c-4907
    Source: firefox.exe, 0000000D.00000003.1894345341.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1772246830.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1899628478.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submits
    Source: firefox.exe, 0000000D.00000003.1825920628.000001CCF2C2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://infra.spec.whatwg.org/#ascii-whitespace
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://install.mozilla.org
    Source: firefox.exe, 0000000D.00000003.1767584688.000001CCEB867000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2019-09/schema
    Source: firefox.exe, 0000000D.00000003.1859708026.000001CCF3047000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2019-09/schema.
    Source: firefox.exe, 0000000D.00000003.1859708026.000001CCF3047000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2019-09/schema./
    Source: firefox.exe, 0000000D.00000003.1859708026.000001CCF3047000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2020-12/schema/
    Source: firefox.exe, 0000000D.00000003.1859708026.000001CCF3047000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2020-12/schema/=
    Source: firefox.exe, 0000000D.00000003.1825920628.000001CCF2C2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lit.dev/docs/libraries/standalone-templates/#rendering-lit-html-templates
    Source: firefox.exe, 0000000D.00000003.1825920628.000001CCF2C2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lit.dev/docs/templates/directives/#stylemap
    Source: firefox.exe, 0000000D.00000003.1825920628.000001CCF2C2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lit.dev/docs/templates/expressions/#child-expressions)
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://location.services.mozilla.com/v1/country?key=%MOZILLA_API_KEY%
    Source: firefox.exe, 0000000D.00000003.1862544568.000001CCED69F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
    Source: firefox.exe, 0000000D.00000003.1863228789.000001CCED61F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1888730530.000001CCED62B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1862544568.000001CCED69F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com
    Source: firefox.exe, 0000000D.00000003.1816286414.000001CCF683A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1818319765.000001CCF6D4A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1883286244.000001CCF683A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lookerstudio.google.com/embed/reporting/
    Source: firefox.exe, 0000000D.00000003.1732553585.000001CCE8433000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734328595.000001CCE841D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734572109.000001CCE8433000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.google.com/mail/?extsrc=mailto&url=%s
    Source: firefox.exe, 0000000D.00000003.1732553585.000001CCE8433000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734328595.000001CCE841D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734572109.000001CCE8433000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.inbox.lv/compose?to=%s
    Source: firefox.exe, 0000000D.00000003.1732553585.000001CCE8433000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734328595.000001CCE841D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734572109.000001CCE8433000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.yahoo.co.jp/compose/?To=%s
    Source: firefox.exe, 00000011.00000002.2938434541.000001AF6E88E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://merino.services.mozilla.com/api/v1/suggest
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mitmdetection.services.mozilla.com/
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/about
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/breach-details/
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/breach-stats?includeResolved=true
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/dashboard
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/preferences
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mozilla-ohttp-fakespot.fastly-edge.com/
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mozilla.cloudflare-dns.com/dns-query
    Source: firefox.exe, 0000000D.00000003.1796685952.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1798151613.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mozilla.org0/
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://normandy.cdn.mozilla.net/api/v1
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://oauth.accounts.firefox.com/v1
    Source: firefox.exe, 0000000D.00000003.1732553585.000001CCE8433000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734328595.000001CCE841D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734572109.000001CCE8433000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://outlook.live.com/default.aspx?rru=compose&to=%s
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
    Source: firefox.exe, 0000000D.00000003.1732553585.000001CCE8433000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734328595.000001CCE841D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734572109.000001CCE8433000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://poczta.interia.pl/mh/?mailto=%s
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://prod.ohttp-gateway.prod.webservices.mozgcp.net/ohttp-configs
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://profile.accounts.firefox.com/v1
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://profiler.firefox.com
    Source: firefox.exe, 0000000D.00000003.1884262283.000001CCF34AA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886215413.000001CCF34AA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1897694251.000001CCF34B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://push.services.mozilla.com
    Source: firefox.exe, 0000000D.00000003.1899628478.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://redux.js.org/api-reference/store#subscribe(listener)
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://relay.firefox.com/accounts/profile/?utm_medium=firefox-desktop&utm_source=modal&utm_campaign
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://relay.firefox.com/api/v1/
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/diagnostic?site=
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%
    Source: firefox.exe, 0000000D.00000003.1896907300.000001CCEC338000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2&
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&p
    Source: firefox.exe, 0000000D.00000003.1864908272.000001CCEC93D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1888849279.000001CCEC93D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=%GOOGLE_SAFEBR
    Source: firefox.exe, 0000000D.00000003.1896907300.000001CCEC338000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=AIzaSyC7jsptDS
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/threatHits?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSIN
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGL
    Source: firefox.exe, 0000000D.00000003.1896907300.000001CCEC338000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=AIzaSy
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_SAFEBROWSING_API_KEY%
    Source: firefox.exe, 0000000D.00000003.1727285035.000001CCEA81F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://screenshots.firefox.com/
    Source: firefox.exe, 0000000D.00000003.1821832515.000001CCEC263000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1843026642.000001CCEC263000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1773451072.000001CCEC266000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1890381759.000001CCEC269000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/abuse/report/addon/
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/addon/
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/language-tools/?app=firefox&type=language&appversi
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/discovery/?lang=%LOCALE%&edition=%DISTRIBUTION%
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
    Source: firefox.exe, 0000000D.00000003.1902551446.000001CCEC060000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2
    Source: firefox.exe, 0000000D.00000003.1864908272.000001CCEC93D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
    Source: firefox.exe, 0000000D.00000003.1888849279.000001CCEC93D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/downloads?client=navclient-auto-ffox&appver=118.0&pver=2.2
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2
    Source: firefox.exe, 0000000D.00000003.1864908272.000001CCEC93D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/gethash?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://snippets.cdn.mozilla.net/%STARTPAGE_VERSION%/%NAME%/%VERSION%/%APPBUILDID%/%BUILD_TARGET%/%L
    Source: firefox.exe, 0000000D.00000003.1815252044.000001CCF6B7E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1887766640.000001CCF2D59000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1817611864.000001CCF2D59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com
    Source: firefox.exe, 00000011.00000002.2938434541.000001AF6E813000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/
    Source: firefox.exe, 0000000D.00000003.1815252044.000001CCF6B7E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1883286244.000001CCF683A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs
    Source: firefox.exe, 0000000D.00000003.1765465610.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1817611864.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1887766640.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs#
    Source: firefox.exe, 0000000D.00000003.1765465610.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1817611864.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1887766640.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs#l
    Source: firefox.exe, 0000000D.00000003.1894345341.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1772246830.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1899628478.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2939224125.0000024FC4C86000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2938434541.000001AF6E8F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/user
    Source: firefox.exe, 0000000D.00000003.1865500849.000001CCEC7D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://static.adsafeprotected.com/firefox-etp-js
    Source: firefox.exe, 0000000D.00000003.1865500849.000001CCEC7D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://static.adsafeprotected.com/firefox-etp-pixel
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cryptominers-report
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/firefox-relay-integration
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/search-engine-removal
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
    Source: firefox.exe, 0000000D.00000003.1884262283.000001CCF34CA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1883999273.000001CCF6548000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886215413.000001CCF34CA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1897446962.000001CCF34CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/118.0.1/WINNT/en-US/
    Source: firefox.exe, 0000000D.00000003.1896372029.000001CCEC3A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/118.0.1/WINNT/en-US/firefox-relay-integration
    Source: firefox.exe, 0000000D.00000003.1814332254.000001CCF7B97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/captive-portal
    Source: firefox.exe, 0000000D.00000003.1860763413.000001CCEE0A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
    Source: firefox.exe, 0000000D.00000003.1825920628.000001CCF2C2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tc39.github.io/ecma262/#sec-typeof-operator
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://token.services.mozilla.com/1.0/sync/1.5
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://topsites.services.mozilla.com/cid/
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://tracking-protection-issues.herokuapp.com/new
    Source: firefox.exe, 0000000D.00000003.1887766640.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://twitter.com/
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://vpn.mozilla.org/?utm_source=firefox-browser&utm_medium=firefox-%CHANNEL%-browser&utm_campaig
    Source: firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://vpn.mozilla.org/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_campaign=about-pr
    Source: firefox.exe, 0000000D.00000003.1889643234.000001CCEC3FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://watch.sling.com/
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://webcompat.com/issues/new
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://webextensions.settings.services.mozilla.com/v1
    Source: firefox.exe, 0000000D.00000003.1894345341.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1772246830.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1899628478.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://webpack.js.org/concepts/mode/)
    Source: firefox.exe, 0000000D.00000003.1893543778.000001CCF2B58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://weibo.com/
    Source: firefox.exe, 0000000D.00000003.1825920628.000001CCF2C2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://wicg.github.io/construct-stylesheets/#using-constructed-stylesheets).
    Source: firefox.exe, 0000000D.00000003.1767584688.000001CCEB867000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.aliexpress.com/
    Source: firefox.exe, 0000000D.00000003.1767584688.000001CCEB867000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.co.uk/
    Source: firefox.exe, 0000000D.00000003.1887766640.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/
    Source: firefox.exe, 0000000F.00000002.2938954967.0000022DD35E8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2939224125.0000024FC4CE8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2941877242.000001AF6EB03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
    Source: firefox.exe, 0000000D.00000003.1887377623.000001CCF303D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727285035.000001CCEA81F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842878406.000001CCEC54C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/exec/obidos/external-search/
    Source: firefox.exe, 0000000D.00000003.1894709494.000001CCEE559000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.fr/
    Source: firefox.exe, 0000000D.00000003.1894709494.000001CCEE559000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.baidu.com/
    Source: firefox.exe, 0000000D.00000003.1894709494.000001CCEE559000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ctrip.com/
    Source: firefox.exe, 0000000D.00000003.1796685952.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1798151613.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: https://www.digicert.com/CPS0
    Source: firefox.exe, 0000000D.00000003.1894709494.000001CCEE559000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ebay.co.uk/
    Source: firefox.exe, 0000000F.00000002.2938954967.0000022DD35E8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2939224125.0000024FC4CE8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2941877242.000001AF6EB03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
    Source: firefox.exe, 0000000D.00000003.1817358221.000001CCF3031000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/
    Source: firefox.exe, 0000000D.00000003.1817991914.000001CCF2D21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/
    Source: firefox.exe, 0000000D.00000003.1763357078.000001CCF2E42000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1762926888.000001CCF2CA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/search
    Source: firefox.exe, 0000000D.00000003.1727934759.000001CCEA877000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727714679.000001CCEA85A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727494060.000001CCEA83C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727055728.000001CCEA600000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727285035.000001CCEA81F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/search?client=firefox&q=
    Source: firefox.exe, 0000000D.00000003.1727934759.000001CCEA877000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727714679.000001CCEA85A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727494060.000001CCEA83C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727055728.000001CCEA600000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1767584688.000001CCEB867000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727285035.000001CCEA81F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842878406.000001CCEC54C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/search
    Source: firefox.exe, 0000000D.00000003.1884506584.000001CCF3429000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1772672033.000001CCEC224000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/search?client=firefox-b-d&q=
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/geolocation/v1/geolocate?key=%GOOGLE_LOCATION_SERVICE_API_KEY%
    Source: firefox.exe, 0000000D.00000003.1767584688.000001CCEB867000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.leboncoin.fr/
    Source: firefox.exe, 0000000D.00000003.1887766640.000001CCF2D93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/about/legal/terms/subscription-services/
    Source: firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/releasenotes/?utm_source=firefox-browser&utm_medi
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/tour/
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/geolocation/
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/new?reason=manual-update
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/notes
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/set-as-default/thanks/
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/xr/
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/privacy/subscription-services/
    Source: firefox.exe, 0000000D.00000003.1767912480.000001CCEBF42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/legal/terms/mozilla/
    Source: firefox.exe, 0000000D.00000003.1896372029.000001CCEC3A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/about/legal/terms/subscription-services/
    Source: firefox.exe, 0000000D.00000003.1883286244.000001CCF6880000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878866282.00002E2740E03000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1883286244.000001CCF683A000.00000004.00000800.00020000.00000000.sdmp, targeting.snapshot.json.tmp.13.drString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/
    Source: firefox.exe, 0000000D.00000003.1878866282.00002E2740E03000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Z
    Source: firefox.exe, 0000000D.00000003.1896372029.000001CCEC3A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/subscription-services/
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/android/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_c
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/ios/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_campa
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html#crash-reporter
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html#health-report
    Source: firefox.exe, 0000000F.00000002.2938954967.0000022DD35CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2939224125.0000024FC4CC7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2938434541.000001AF6E8F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/
    Source: firefox.exe, 0000000D.00000003.1765465610.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1817611864.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1887766640.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/#suggest-relevant-contentP
    Source: firefox.exe, 00000011.00000002.2938434541.000001AF6E8F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/(
    Source: firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_c
    Source: firefox.exe, 0000000D.00000003.1765465610.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1817611864.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1887766640.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/V
    Source: firefox.exe, 0000000D.00000003.1862544568.000001CCED69F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com
    Source: firefox.exe, 0000000D.00000003.1893543778.000001CCF2B58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.olx.pl/
    Source: firefox.exe, 0000000D.00000003.1887766640.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.reddit.com/
    Source: firefox.exe, 0000000D.00000003.1879175810.00002DE7C6B03000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1889643234.000001CCEC3FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.sling.com/
    Source: firefox.exe, 0000000D.00000003.1817611864.000001CCF2D3F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1887766640.000001CCF2D4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1818319765.000001CCF6D4E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878692758.0000062E54203000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.tiktok.com/
    Source: firefox.exe, 00000010.00000002.2939224125.0000024FC4C03000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2938434541.000001AF6E80C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/
    Source: firefox.exe, 0000000D.00000003.1893543778.000001CCF2B58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.zhihu.com/
    Source: firefox.exe, 0000000D.00000003.1766631178.000001CCECF9F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1825821115.000001CCF6BF7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1901513424.000001CCF6BF7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892175775.000001CCF6BF7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1816286414.000001CCF68B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1766631178.000001CCECFC0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://youtube.com
    Source: firefox.exe, 0000000D.00000003.1863127423.000001CCED64E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/
    Source: recovery.jsonlz4.tmp.13.drString found in binary or memory: https://youtube.com/account?=
    Source: firefox.exe, 00000011.00000002.2941159095.000001AF6E910000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/sig
    Source: firefox.exe, 00000010.00000002.2938060204.0000024FC4B50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/sigm
    Source: firefox.exe, 0000000D.00000003.1824878006.000001CCF6E5F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845180806.000001CCED380000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902347555.000001CCEC0C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2937059289.0000022DD30CA000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2937059289.0000022DD30C0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2938632347.0000022DD34F4000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2938060204.0000024FC4B54000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2937039213.0000024FC48C0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2937039213.0000024FC48CA000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2937768774.000001AF6E590000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2941159095.000001AF6E914000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2937768774.000001AF6E59A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
    Source: firefox.exe, 0000000B.00000002.1716513364.000001F39D4CA000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000C.00000002.1722077681.00000256269FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd--no-default-browser
    Source: firefox.exe, 0000000F.00000002.2937059289.0000022DD30C0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2938632347.0000022DD34F4000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2938060204.0000024FC4B54000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2937039213.0000024FC48C0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2937768774.000001AF6E590000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2941159095.000001AF6E914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdMOZ_CRASHREPORTER_RE
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49820
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
    Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
    Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49961 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
    Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
    Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
    Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
    Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
    Source: unknownNetwork traffic detected: HTTP traffic on port 49820 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
    Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
    Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49961
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
    Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
    Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
    Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
    Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
    Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
    Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
    Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
    Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49743 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.4:49745 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.4:49752 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49758 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49764 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49763 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49773 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 151.101.193.91:443 -> 192.168.2.4:49775 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49774 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49779 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49778 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49780 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49781 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49820 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49819 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49818 version: TLS 1.2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0072EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0072EAFF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0072ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0072ED6A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0072EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0072EAFF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0071AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_0071AA57
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00749576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00749576

    System Summary

    barindex
    Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
    Source: file.exe, 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_7ac065d0-b
    Source: file.exe, 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_0bace3ee-5
    Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_505f7bc2-6
    Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_5cd6cb95-2
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_0000024FC4BE5AF7 NtQuerySystemInformation,16_2_0000024FC4BE5AF7
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_0000024FC51A4872 NtQuerySystemInformation,16_2_0000024FC51A4872
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0071D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_0071D5EB
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00711201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00711201
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0071E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0071E8F6
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006BBF400_2_006BBF40
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006B80600_2_006B8060
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007220460_2_00722046
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007182980_2_00718298
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006EE4FF0_2_006EE4FF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006E676B0_2_006E676B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007448730_2_00744873
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006BCAF00_2_006BCAF0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006DCAA00_2_006DCAA0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006CCC390_2_006CCC39
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006E6DD90_2_006E6DD9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006CB1190_2_006CB119
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006B91C00_2_006B91C0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006D13940_2_006D1394
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006D17060_2_006D1706
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006D781B0_2_006D781B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006C997D0_2_006C997D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006B79200_2_006B7920
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006D19B00_2_006D19B0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006D7A4A0_2_006D7A4A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006D1C770_2_006D1C77
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006D7CA70_2_006D7CA7
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0073BE440_2_0073BE44
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006E9EEE0_2_006E9EEE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006D1F320_2_006D1F32
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_0000024FC4BE5AF716_2_0000024FC4BE5AF7
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_0000024FC51A487216_2_0000024FC51A4872
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_0000024FC51A4F9C16_2_0000024FC51A4F9C
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_0000024FC51A48B216_2_0000024FC51A48B2
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 006D0A30 appears 46 times
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 006CF9F2 appears 31 times
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: classification engineClassification label: mal72.troj.evad.winEXE@34/34@65/12
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007237B5 GetLastError,FormatMessageW,0_2_007237B5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007110BF AdjustTokenPrivileges,CloseHandle,0_2_007110BF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007116C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_007116C3
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007251CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_007251CD
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0071D4DC CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0071D4DC
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0072648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_0072648E
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006B42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_006B42A2
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Local\Mozilla\Firefox\SkeletonUILock-c388d246Jump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7672:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7608:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7480:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7376:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7544:120:WilError_03
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Local\Temp\firefoxJump to behavior
    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: firefox.exe, 0000000D.00000003.1817002065.000001CCF65D2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1883923310.000001CCF65D2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT * FROM events WHERE timestamp BETWEEN date(:dateFrom) AND date(:dateTo);
    Source: firefox.exe, 0000000D.00000003.1817002065.000001CCF65D2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1883923310.000001CCF65D2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE events (id INTEGER PRIMARY KEY, type INTEGER NOT NULL, count INTEGER NOT NULL, timestamp DATE );
    Source: firefox.exe, 0000000D.00000003.1817002065.000001CCF65D2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1883923310.000001CCF65D2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: INSERT INTO events (type, count, timestamp) VALUES (:type, 1, date(:date));
    Source: firefox.exe, 0000000D.00000003.1817002065.000001CCF65D2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1883923310.000001CCF65D2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT timestamp FROM events ORDER BY timestamp ASC LIMIT 1;;
    Source: firefox.exe, 0000000D.00000003.1815704030.000001CCF6957000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT sum(count) FROM events;
    Source: firefox.exe, 0000000D.00000003.1817002065.000001CCF65D2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1883923310.000001CCF65D2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT timestamp FROM events ORDER BY timestamp ASC LIMIT 1;;Fy6
    Source: firefox.exe, 0000000D.00000003.1817002065.000001CCF65D2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1883923310.000001CCF65D2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: UPDATE events SET count = count + 1 WHERE id = :id;-
    Source: firefox.exe, 0000000D.00000003.1817002065.000001CCF65D2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1883923310.000001CCF65D2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT sum(count) FROM events;9'
    Source: firefox.exe, 0000000D.00000003.1817002065.000001CCF65D2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1883923310.000001CCF65D2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT sum(count) FROM events;9
    Source: firefox.exe, 0000000D.00000003.1817002065.000001CCF65D2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1883923310.000001CCF65D2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT * FROM events WHERE type = :type AND timestamp = date(:date);
    Source: file.exeReversingLabs: Detection: 47%
    Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
    Source: unknownProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2276 -parentBuildID 20230927232528 -prefsHandle 2216 -prefMapHandle 2208 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a46847d0-9293-4bac-8415-4fa2947c8e97} 7776 "\\.\pipe\gecko-crash-server-pipe.7776" 1ccdad6d510 socket
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2696 -parentBuildID 20230927232528 -prefsHandle 4228 -prefMapHandle 4224 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7cff00d-f0b1-495f-9d3f-92f956d45c2c} 7776 "\\.\pipe\gecko-crash-server-pipe.7776" 1ccece2fb10 rdd
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4952 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4956 -prefMapHandle 4904 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ff0ebe7f-fa1c-41ff-ae44-07a5d0ab7bae} 7776 "\\.\pipe\gecko-crash-server-pipe.7776" 1ccec341110 utility
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blockingJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blockingJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2276 -parentBuildID 20230927232528 -prefsHandle 2216 -prefMapHandle 2208 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a46847d0-9293-4bac-8415-4fa2947c8e97} 7776 "\\.\pipe\gecko-crash-server-pipe.7776" 1ccdad6d510 socketJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2696 -parentBuildID 20230927232528 -prefsHandle 4228 -prefMapHandle 4224 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7cff00d-f0b1-495f-9d3f-92f956d45c2c} 7776 "\\.\pipe\gecko-crash-server-pipe.7776" 1ccece2fb10 rddJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4952 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4956 -prefMapHandle 4904 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ff0ebe7f-fa1c-41ff-ae44-07a5d0ab7bae} 7776 "\\.\pipe\gecko-crash-server-pipe.7776" 1ccec341110 utilityJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdbV source: gmpopenh264.dll.tmp.13.dr
    Source: Binary string: pnrpnsp.pdb source: firefox.exe, 0000000D.00000003.1821347049.000001CCEA493000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdb source: gmpopenh264.dll.tmp.13.dr
    Source: Binary string: pnrpnsp.pdbUGP source: firefox.exe, 0000000D.00000003.1821347049.000001CCEA493000.00000004.00000020.00020000.00000000.sdmp
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006B42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_006B42DE
    Source: gmpopenh264.dll.tmp.13.drStatic PE information: section name: .rodata
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006D0A76 push ecx; ret 0_2_006D0A89
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmpJump to dropped file
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)Jump to dropped file
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006CF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_006CF98E
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00741C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00741C41
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-95067
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_0000024FC4BE5AF7 rdtsc 16_2_0000024FC4BE5AF7
    Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.7 %
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0071DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0071DBBE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007268EE FindFirstFileW,FindClose,0_2_007268EE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0072698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0072698F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0071D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0071D076
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0071D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0071D3A9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00729642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00729642
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0072979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0072979D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00729B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00729B2B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00725C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00725C97
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006B42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_006B42DE
    Source: firefox.exe, 00000010.00000002.2937039213.0000024FC48CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`x
    Source: firefox.exe, 00000011.00000002.2941664590.000001AF6E920000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWX
    Source: firefox.exe, 0000000F.00000002.2942444344.0000022DD3A40000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWWPV7
    Source: firefox.exe, 00000010.00000002.2941773907.0000024FC5092000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllo
    Source: firefox.exe, 00000010.00000002.2941773907.0000024FC5092000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlls
    Source: firefox.exe, 0000000F.00000002.2937059289.0000022DD30CA000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2942444344.0000022DD3A40000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2941773907.0000024FC5092000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2937768774.000001AF6E59A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: firefox.exe, 0000000F.00000002.2941719706.0000022DD3618000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW : 2 : 34 : 1 : 1 : 0x20026 : 0x8 : %SystemRoot%\system32\mswsock.dll : : 1234191b-4bf7-4ca7-86e0-dfd7c32b5445
    Source: firefox.exe, 0000000F.00000002.2937059289.0000022DD30CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
    Source: firefox.exe, 0000000F.00000002.2942444344.0000022DD3A40000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2941773907.0000024FC5092000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_0000024FC4BE5AF7 rdtsc 16_2_0000024FC4BE5AF7
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0072EAA2 BlockInput,0_2_0072EAA2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006E2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_006E2622
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006B42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_006B42DE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006D4CE8 mov eax, dword ptr fs:[00000030h]0_2_006D4CE8
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00710B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00710B62
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006E2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_006E2622
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006D083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_006D083F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006D09D5 SetUnhandledExceptionFilter,0_2_006D09D5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006D0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_006D0C21
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00711201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00711201
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006F2BA5 KiUserCallbackDispatcher,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_006F2BA5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0071B226 SendInput,keybd_event,0_2_0071B226
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007322DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_007322DA
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00710B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00710B62
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00711663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00711663
    Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
    Source: file.exeBinary or memory string: Shell_TrayWnd
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006D0698 cpuid 0_2_006D0698
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00728195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00728195
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0070D27A GetUserNameW,0_2_0070D27A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006EBB6F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_006EBB6F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006B42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_006B42DE

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 7352, type: MEMORYSTR
    Source: file.exeBinary or memory string: WIN_81
    Source: file.exeBinary or memory string: WIN_XP
    Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
    Source: file.exeBinary or memory string: WIN_XPe
    Source: file.exeBinary or memory string: WIN_VISTA
    Source: file.exeBinary or memory string: WIN_7
    Source: file.exeBinary or memory string: WIN_8

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 7352, type: MEMORYSTR
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00731204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00731204
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00731806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00731806
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire Infrastructure2
    Valid Accounts
    1
    Windows Management Instrumentation
    1
    DLL Side-Loading
    1
    Exploitation for Privilege Escalation
    2
    Disable or Modify Tools
    21
    Input Capture
    2
    System Time Discovery
    Remote Services1
    Archive Collected Data
    2
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault Accounts1
    Native API
    2
    Valid Accounts
    1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    LSASS Memory1
    Account Discovery
    Remote Desktop Protocol21
    Input Capture
    12
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    Extra Window Memory Injection
    2
    Obfuscated Files or Information
    Security Account Manager2
    File and Directory Discovery
    SMB/Windows Admin Shares3
    Clipboard Data
    2
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
    Valid Accounts
    1
    DLL Side-Loading
    NTDS16
    System Information Discovery
    Distributed Component Object ModelInput Capture3
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
    Access Token Manipulation
    1
    Extra Window Memory Injection
    LSA Secrets131
    Security Software Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
    Process Injection
    1
    Masquerading
    Cached Domain Credentials1
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
    Valid Accounts
    DCSync3
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    Virtualization/Sandbox Evasion
    Proc Filesystem1
    Application Window Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
    Access Token Manipulation
    /etc/passwd and /etc/shadow1
    System Owner/User Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron2
    Process Injection
    Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1545679 Sample: file.exe Startdate: 30/10/2024 Architecture: WINDOWS Score: 72 45 youtube.com 2->45 47 youtube-ui.l.google.com 2->47 49 34 other IPs or domains 2->49 57 Multi AV Scanner detection for submitted file 2->57 59 Yara detected Credential Flusher 2->59 61 Binary is likely a compiled AutoIt script file 2->61 63 2 other signatures 2->63 8 file.exe 2->8         started        11 firefox.exe 1 2->11         started        signatures3 process4 signatures5 65 Binary is likely a compiled AutoIt script file 8->65 67 Found API chain indicative of sandbox detection 8->67 13 taskkill.exe 1 8->13         started        15 taskkill.exe 1 8->15         started        17 taskkill.exe 1 8->17         started        23 3 other processes 8->23 19 firefox.exe 3 218 11->19         started        process6 dnsIp7 25 conhost.exe 13->25         started        27 conhost.exe 15->27         started        29 conhost.exe 17->29         started        51 youtube.com 172.217.23.110, 443, 49739, 49740 GOOGLEUS United States 19->51 53 prod.detectportal.prod.cloudops.mozgcp.net 34.107.221.82, 49741, 49746, 49748 GOOGLEUS United States 19->53 55 10 other IPs or domains 19->55 41 C:\Users\user\AppData\...\gmpopenh264.dll.tmp, PE32+ 19->41 dropped 43 C:\Users\user\...\gmpopenh264.dll (copy), PE32+ 19->43 dropped 31 firefox.exe 1 19->31         started        33 firefox.exe 1 19->33         started        35 firefox.exe 1 19->35         started        37 conhost.exe 23->37         started        39 conhost.exe 23->39         started        file8 process9

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    file.exe47%ReversingLabsWin32.Trojan.CredentialFlusher
    file.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)0%ReversingLabs
    C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l0%URL Reputationsafe
    http://detectportal.firefox.com/0%URL Reputationsafe
    https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%0%URL Reputationsafe
    https://datastudio.google.com/embed/reporting/0%URL Reputationsafe
    http://www.mozilla.com00%URL Reputationsafe
    https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.0%URL Reputationsafe
    https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl0%URL Reputationsafe
    https://merino.services.mozilla.com/api/v1/suggest0%URL Reputationsafe
    https://json-schema.org/draft/2019-09/schema.0%URL Reputationsafe
    https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect0%URL Reputationsafe
    https://www.leboncoin.fr/0%URL Reputationsafe
    https://spocs.getpocket.com/spocs0%URL Reputationsafe
    https://shavar.services.mozilla.com0%URL Reputationsafe
    https://completion.amazon.com/search/complete?q=0%URL Reputationsafe
    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report0%URL Reputationsafe
    https://ads.stickyadstv.com/firefox-etp0%URL Reputationsafe
    https://identity.mozilla.com/ids/ecosystem_telemetryU0%URL Reputationsafe
    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab0%URL Reputationsafe
    https://monitor.firefox.com/breach-details/0%URL Reputationsafe
    https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM0%URL Reputationsafe
    https://services.addons.mozilla.org/api/v4/addons/addon/0%URL Reputationsafe
    https://tracking-protection-issues.herokuapp.com/new0%URL Reputationsafe
    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report0%URL Reputationsafe
    https://json-schema.org/draft/2020-12/schema/=0%URL Reputationsafe
    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report0%URL Reputationsafe
    https://api.accounts.firefox.com/v10%URL Reputationsafe
    https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.20%URL Reputationsafe
    https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections0%URL Reputationsafe
    https://bugzilla.mozilla.org/show_bug.cgi?id=12836010%URL Reputationsafe
    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield0%URL Reputationsafe
    https://MD8.mozilla.org/1/m0%URL Reputationsafe
    https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=0%URL Reputationsafe
    https://bugzilla.mozilla.org/show_bug.cgi?id=12662200%URL Reputationsafe
    https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-1520%URL Reputationsafe
    https://bugzilla.mo0%URL Reputationsafe
    https://mitmdetection.services.mozilla.com/0%URL Reputationsafe
    https://static.adsafeprotected.com/firefox-etp-js0%URL Reputationsafe
    https://spocs.getpocket.com/0%URL Reputationsafe
    https://services.addons.mozilla.org/api/v4/abuse/report/addon/0%URL Reputationsafe
    https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%0%URL Reputationsafe
    https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f0%URL Reputationsafe
    https://monitor.firefox.com/user/breach-stats?includeResolved=true0%URL Reputationsafe
    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report0%URL Reputationsafe
    https://safebrowsing.google.com/safebrowsing/diagnostic?site=0%URL Reputationsafe
    https://monitor.firefox.com/user/dashboard0%URL Reputationsafe
    https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID0%URL Reputationsafe
    https://monitor.firefox.com/about0%URL Reputationsafe
    https://account.bellmedia.c0%URL Reputationsafe
    https://login.microsoftonline.com0%URL Reputationsafe
    https://coverage.mozilla.org0%URL Reputationsafe
    http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
    https://www.zhihu.com/0%URL Reputationsafe
    https://infra.spec.whatwg.org/#ascii-whitespace0%URL Reputationsafe
    https://blocked.cdn.mozilla.net/0%URL Reputationsafe
    https://json-schema.org/draft/2019-09/schema0%URL Reputationsafe
    https://profiler.firefox.com0%URL Reputationsafe
    https://outlook.live.com/default.aspx?rru=compose&to=%s0%URL Reputationsafe
    https://bugzilla.mozilla.org/show_bug.cgi?id=7938690%URL Reputationsafe
    https://identity.mozilla.com/apps/relay0%URL Reputationsafe
    https://mozilla.cloudflare-dns.com/dns-query0%URL Reputationsafe
    https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings20%URL Reputationsafe
    https://bugzilla.mozilla.org/show_bug.cgi?id=16784480%URL Reputationsafe
    https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg0%URL Reputationsafe
    https://contile.services.mozilla.com/v1/tiles0%URL Reputationsafe
    https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/0%URL Reputationsafe
    https://monitor.firefox.com/user/preferences0%URL Reputationsafe
    https://screenshots.firefox.com/0%URL Reputationsafe
    http://json-schema.org/draft-07/schema#-0%URL Reputationsafe
    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report0%URL Reputationsafe
    https://www.olx.pl/0%URL Reputationsafe
    https://poczta.interia.pl/mh/?mailto=%s0%URL Reputationsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    example.org
    93.184.215.14
    truefalse
      unknown
      star-mini.c10r.facebook.com
      157.240.0.35
      truefalse
        unknown
        prod.classify-client.prod.webservices.mozgcp.net
        35.190.72.216
        truefalse
          unknown
          prod.balrog.prod.cloudops.mozgcp.net
          35.244.181.201
          truefalse
            unknown
            twitter.com
            104.244.42.129
            truefalse
              unknown
              prod.detectportal.prod.cloudops.mozgcp.net
              34.107.221.82
              truefalse
                unknown
                services.addons.mozilla.org
                151.101.193.91
                truefalse
                  unknown
                  dyna.wikimedia.org
                  185.15.59.224
                  truefalse
                    unknown
                    prod.remote-settings.prod.webservices.mozgcp.net
                    34.149.100.209
                    truefalse
                      unknown
                      contile.services.mozilla.com
                      34.117.188.166
                      truefalse
                        unknown
                        youtube.com
                        172.217.23.110
                        truefalse
                          unknown
                          prod.content-signature-chains.prod.webservices.mozgcp.net
                          34.160.144.191
                          truefalse
                            unknown
                            youtube-ui.l.google.com
                            142.250.185.78
                            truefalse
                              unknown
                              us-west1.prod.sumo.prod.webservices.mozgcp.net
                              34.149.128.2
                              truefalse
                                unknown
                                reddit.map.fastly.net
                                151.101.1.140
                                truefalse
                                  unknown
                                  ipv4only.arpa
                                  192.0.0.170
                                  truefalse
                                    unknown
                                    prod.ads.prod.webservices.mozgcp.net
                                    34.117.188.166
                                    truefalse
                                      unknown
                                      push.services.mozilla.com
                                      34.107.243.93
                                      truefalse
                                        unknown
                                        normandy-cdn.services.mozilla.com
                                        35.201.103.21
                                        truefalse
                                          unknown
                                          telemetry-incoming.r53-2.services.mozilla.com
                                          34.120.208.123
                                          truefalse
                                            unknown
                                            www.reddit.com
                                            unknown
                                            unknownfalse
                                              unknown
                                              spocs.getpocket.com
                                              unknown
                                              unknownfalse
                                                unknown
                                                content-signature-2.cdn.mozilla.net
                                                unknown
                                                unknownfalse
                                                  unknown
                                                  support.mozilla.org
                                                  unknown
                                                  unknownfalse
                                                    unknown
                                                    firefox.settings.services.mozilla.com
                                                    unknown
                                                    unknownfalse
                                                      unknown
                                                      www.youtube.com
                                                      unknown
                                                      unknownfalse
                                                        unknown
                                                        www.facebook.com
                                                        unknown
                                                        unknownfalse
                                                          unknown
                                                          detectportal.firefox.com
                                                          unknown
                                                          unknownfalse
                                                            unknown
                                                            normandy.cdn.mozilla.net
                                                            unknown
                                                            unknownfalse
                                                              unknown
                                                              shavar.services.mozilla.com
                                                              unknown
                                                              unknownfalse
                                                                unknown
                                                                www.wikipedia.org
                                                                unknown
                                                                unknownfalse
                                                                  unknown
                                                                  NameSourceMaliciousAntivirus DetectionReputation
                                                                  https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                    unknown
                                                                    https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_lfirefox.exe, 0000000D.00000003.1894345341.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1772246830.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1899628478.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2939224125.0000024FC4CC7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2938434541.000001AF6E8C4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://crl3.difirefox.exe, 0000000D.00000003.1821492878.000001CCEA48E000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1823262403.000001CCEA48E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      unknown
                                                                      http://detectportal.firefox.com/firefox.exe, 0000000D.00000003.1888849279.000001CCEC9B5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://datastudio.google.com/embed/reporting/firefox.exe, 0000000D.00000003.1816286414.000001CCF683A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1818319765.000001CCF6D4A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1883286244.000001CCF683A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      http://www.mozilla.com0gmpopenh264.dll.tmp.13.drfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.firefox.exe, 0000000F.00000002.2938954967.0000022DD35E8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2939224125.0000024FC4CE8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2941877242.000001AF6EB03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecyclfirefox.exe, 0000000D.00000003.1825920628.000001CCF2C2D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://merino.services.mozilla.com/api/v1/suggestfirefox.exe, 00000011.00000002.2938434541.000001AF6E88E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://json-schema.org/draft/2019-09/schema.firefox.exe, 0000000D.00000003.1859708026.000001CCF3047000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protectfirefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://www.leboncoin.fr/firefox.exe, 0000000D.00000003.1767584688.000001CCEB867000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://spocs.getpocket.com/spocsfirefox.exe, 0000000D.00000003.1815252044.000001CCF6B7E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1883286244.000001CCF683A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://shavar.services.mozilla.comfirefox.exe, 0000000D.00000003.1902551446.000001CCEC060000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://completion.amazon.com/search/complete?q=firefox.exe, 0000000D.00000003.1817611864.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727714679.000001CCEA85A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727494060.000001CCEA83C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727055728.000001CCEA600000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727285035.000001CCEA81F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-reportfirefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://ads.stickyadstv.com/firefox-etpfirefox.exe, 0000000D.00000003.1865500849.000001CCEC7D4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://identity.mozilla.com/ids/ecosystem_telemetryUfirefox.exe, 0000000D.00000003.1883999273.000001CCF65B4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tabfirefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://monitor.firefox.com/breach-details/firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEMfirefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://www.amazon.com/exec/obidos/external-search/firefox.exe, 0000000D.00000003.1887377623.000001CCF303D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727285035.000001CCEA81F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842878406.000001CCEC54C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        unknown
                                                                        https://www.msn.comfirefox.exe, 0000000D.00000003.1862544568.000001CCED69F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          unknown
                                                                          http://mozilla.org/0firefox.exe, 0000000D.00000003.1879175810.00002DE7C6B03000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1879002579.00000DAB99A03000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            unknown
                                                                            https://github.com/mozilla-services/screenshotsfirefox.exe, 0000000D.00000003.1727934759.000001CCEA877000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727714679.000001CCEA85A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727494060.000001CCEA83C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727055728.000001CCEA600000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727285035.000001CCEA81F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              unknown
                                                                              https://services.addons.mozilla.org/api/v4/addons/addon/firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              https://tracking-protection-issues.herokuapp.com/newfirefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-reportfirefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              https://youtube.com/firefox.exe, 0000000D.00000003.1863127423.000001CCED64E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                unknown
                                                                                https://json-schema.org/draft/2020-12/schema/=firefox.exe, 0000000D.00000003.1859708026.000001CCF3047000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94firefox.exe, 0000000F.00000002.2938954967.0000022DD35E8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2939224125.0000024FC4CE8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2941877242.000001AF6EB03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                                                  unknown
                                                                                  https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-reportfirefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                  • URL Reputation: safe
                                                                                  unknown
                                                                                  https://api.accounts.firefox.com/v1firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                  • URL Reputation: safe
                                                                                  unknown
                                                                                  https://www.amazon.com/firefox.exe, 0000000D.00000003.1887766640.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    unknown
                                                                                    https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                      unknown
                                                                                      https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2firefox.exe, 0000000D.00000003.1864908272.000001CCEC93D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      • URL Reputation: safe
                                                                                      unknown
                                                                                      https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protectionsfirefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                      • URL Reputation: safe
                                                                                      unknown
                                                                                      https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&ctafirefox.exe, 0000000F.00000002.2938954967.0000022DD35E8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2939224125.0000024FC4CE8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2941877242.000001AF6EB03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                                                        unknown
                                                                                        https://www.youtube.com/firefox.exe, 00000010.00000002.2939224125.0000024FC4C03000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2938434541.000001AF6E80C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          unknown
                                                                                          https://bugzilla.mozilla.org/show_bug.cgi?id=1283601firefox.exe, 0000000D.00000003.1776663554.000001CCEB198000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1778441389.000001CCEB15D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          • URL Reputation: safe
                                                                                          unknown
                                                                                          https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shieldfirefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                          • URL Reputation: safe
                                                                                          unknown
                                                                                          https://MD8.mozilla.org/1/mfirefox.exe, 0000000D.00000003.1903348487.000001CCEB467000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          • URL Reputation: safe
                                                                                          unknown
                                                                                          https://addons.mozilla.org/firefox/addon/to-google-translate/firefox.exe, 0000000D.00000003.1884262283.000001CCF34F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886215413.000001CCF34F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1897446962.000001CCF34F0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            unknown
                                                                                            https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=firefox.exe, 0000000D.00000003.1887766640.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1899628478.000001CCEE5BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2939224125.0000024FC4CC7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2938434541.000001AF6E8C4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            • URL Reputation: safe
                                                                                            unknown
                                                                                            http://127.0.0.1:firefox.exe, 0000000D.00000003.1860635516.000001CCEEA93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                              unknown
                                                                                              https://bugzilla.mozilla.org/show_bug.cgi?id=1266220firefox.exe, 0000000D.00000003.1776663554.000001CCEB198000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1778441389.000001CCEB15D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152firefox.exe, 0000000D.00000003.1821832515.000001CCEC263000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1843026642.000001CCEC263000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1773451072.000001CCEC266000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1890381759.000001CCEC269000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://bugzilla.mofirefox.exe, 0000000D.00000003.1897802935.000001CCF3405000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://mitmdetection.services.mozilla.com/firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://static.adsafeprotected.com/firefox-etp-jsfirefox.exe, 0000000D.00000003.1865500849.000001CCEC7D4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://youtube.com/account?=recovery.jsonlz4.tmp.13.drfalse
                                                                                                unknown
                                                                                                http://crl3.digicfirefox.exe, 0000000D.00000003.1796685952.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1798151613.000001CCEA45B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                  unknown
                                                                                                  https://spocs.getpocket.com/firefox.exe, 00000011.00000002.2938434541.000001AF6E813000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  • URL Reputation: safe
                                                                                                  unknown
                                                                                                  https://services.addons.mozilla.org/api/v4/abuse/report/addon/firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                  • URL Reputation: safe
                                                                                                  unknown
                                                                                                  https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                  • URL Reputation: safe
                                                                                                  unknown
                                                                                                  https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-ffirefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                  • URL Reputation: safe
                                                                                                  unknown
                                                                                                  https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_rfirefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                    unknown
                                                                                                    https://monitor.firefox.com/user/breach-stats?includeResolved=truefirefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-reportfirefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://safebrowsing.google.com/safebrowsing/diagnostic?site=firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://monitor.firefox.com/user/dashboardfirefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_IDfirefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://monitor.firefox.com/aboutfirefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    http://mozilla.org/MPL/2.0/.firefox.exe, 0000000D.00000003.1820483312.000001CCEAD8D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1838138758.000001CCEC61D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1838757378.000001CCEC6A1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1821832515.000001CCEC263000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1890595471.000001CCEADD9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1815102465.000001CCF6CAB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1898150951.000001CCF2BB5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1825920628.000001CCF2C19000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1828093438.000001CCEC245000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1828093438.000001CCEC295000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1730753730.000001CCEA868000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1828093438.000001CCEC248000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1880388264.000001CCEC50A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1736515083.000001CCEB642000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1843026642.000001CCEC258000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885214047.000001CCEADD3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1820483312.000001CCEADEF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1861720281.000001CCEE02B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765647907.000001CCED4DB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834385858.000001CCEC62B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1828093438.000001CCEC29C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      unknown
                                                                                                      https://account.bellmedia.cfirefox.exe, 0000000D.00000003.1862544568.000001CCED69F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      http://youtube.com/firefox.exe, 0000000D.00000003.1817358221.000001CCF303D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        unknown
                                                                                                        https://login.microsoftonline.comfirefox.exe, 0000000D.00000003.1863228789.000001CCED61F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1888730530.000001CCED62B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1862544568.000001CCED69F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://coverage.mozilla.orgfirefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        http://crl.thawte.com/ThawteTimestampingCA.crl0gmpopenh264.dll.tmp.13.drfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://www.zhihu.com/firefox.exe, 0000000D.00000003.1893543778.000001CCF2B58000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://infra.spec.whatwg.org/#ascii-whitespacefirefox.exe, 0000000D.00000003.1825920628.000001CCF2C2D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://blocked.cdn.mozilla.net/firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://json-schema.org/draft/2019-09/schemafirefox.exe, 0000000D.00000003.1767584688.000001CCEB867000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://profiler.firefox.comfirefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://outlook.live.com/default.aspx?rru=compose&to=%sfirefox.exe, 0000000D.00000003.1732553585.000001CCE8433000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734328595.000001CCE841D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734572109.000001CCE8433000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://bugzilla.mozilla.org/show_bug.cgi?id=793869firefox.exe, 0000000D.00000003.1778441389.000001CCEB15D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://identity.mozilla.com/apps/relayfirefox.exe, 0000000D.00000003.1896162879.000001CCEC3BA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://mozilla.cloudflare-dns.com/dns-queryfirefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2firefox.exe, 0000000D.00000003.1860763413.000001CCEE0A7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://bugzilla.mozilla.org/show_bug.cgi?id=1678448firefox.exe, 0000000D.00000003.1776663554.000001CCEB198000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1778441389.000001CCEB15D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://mail.yahoo.co.jp/compose/?To=%sfirefox.exe, 0000000D.00000003.1732553585.000001CCE8433000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734328595.000001CCE841D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734572109.000001CCE8433000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          unknown
                                                                                                          https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/firefox.exe, 0000000D.00000003.1884262283.000001CCF34F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886215413.000001CCF34F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1897446962.000001CCF34F0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            unknown
                                                                                                            https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpgfirefox.exe, 0000000F.00000002.2938954967.0000022DD35E8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2939224125.0000024FC4CE8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2941877242.000001AF6EB03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                                                                            • URL Reputation: safe
                                                                                                            unknown
                                                                                                            https://contile.services.mozilla.com/v1/tilesfirefox.exe, 0000000D.00000003.1887766640.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                            • URL Reputation: safe
                                                                                                            unknown
                                                                                                            https://www.amazon.co.uk/firefox.exe, 0000000D.00000003.1767584688.000001CCEB867000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                              unknown
                                                                                                              https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/firefox.exe, 0000000D.00000003.1815252044.000001CCF6B8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902347555.000001CCEC0C7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                              • URL Reputation: safe
                                                                                                              unknown
                                                                                                              https://monitor.firefox.com/user/preferencesfirefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                              • URL Reputation: safe
                                                                                                              unknown
                                                                                                              https://screenshots.firefox.com/firefox.exe, 0000000D.00000003.1727285035.000001CCEA81F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                              • URL Reputation: safe
                                                                                                              unknown
                                                                                                              https://www.google.com/searchfirefox.exe, 0000000D.00000003.1727934759.000001CCEA877000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727714679.000001CCEA85A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727494060.000001CCEA83C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727055728.000001CCEA600000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1767584688.000001CCEB867000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727285035.000001CCEA81F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842878406.000001CCEC54C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                unknown
                                                                                                                https://relay.firefox.com/api/v1/firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                  unknown
                                                                                                                  http://json-schema.org/draft-07/schema#-firefox.exe, 0000000D.00000003.1859708026.000001CCF3047000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                  • URL Reputation: safe
                                                                                                                  unknown
                                                                                                                  https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-reportfirefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                  • URL Reputation: safe
                                                                                                                  unknown
                                                                                                                  https://topsites.services.mozilla.com/cid/firefox.exe, 0000000F.00000002.2938371233.0000022DD32B0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2938370292.0000024FC4B60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2938050483.000001AF6E6A0000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                    unknown
                                                                                                                    https://twitter.com/firefox.exe, 0000000D.00000003.1887766640.000001CCF2D97000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                      unknown
                                                                                                                      https://www.olx.pl/firefox.exe, 0000000D.00000003.1893543778.000001CCF2B58000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                      • URL Reputation: safe
                                                                                                                      unknown
                                                                                                                      https://bugzilla.mozilla.org/show_bug.cgi?id=1193802firefox.exe, 0000000D.00000003.1776663554.000001CCEB198000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1778441389.000001CCEB15D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                        unknown
                                                                                                                        http://mozilla.org/Zfirefox.exe, 0000000D.00000003.1879175810.00002DE7C6B03000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1879002579.00000DAB99A03000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                          unknown
                                                                                                                          https://poczta.interia.pl/mh/?mailto=%sfirefox.exe, 0000000D.00000003.1732553585.000001CCE8433000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734328595.000001CCE841D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734572109.000001CCE8433000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                          • URL Reputation: safe
                                                                                                                          unknown
                                                                                                                          https://www.google.com/complete/searchfirefox.exe, 0000000D.00000003.1763357078.000001CCF2E42000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1762926888.000001CCF2CA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                            unknown
                                                                                                                            • No. of IPs < 25%
                                                                                                                            • 25% < No. of IPs < 50%
                                                                                                                            • 50% < No. of IPs < 75%
                                                                                                                            • 75% < No. of IPs
                                                                                                                            IPDomainCountryFlagASNASN NameMalicious
                                                                                                                            34.149.100.209
                                                                                                                            prod.remote-settings.prod.webservices.mozgcp.netUnited States
                                                                                                                            2686ATGS-MMD-ASUSfalse
                                                                                                                            34.107.243.93
                                                                                                                            push.services.mozilla.comUnited States
                                                                                                                            15169GOOGLEUSfalse
                                                                                                                            34.107.221.82
                                                                                                                            prod.detectportal.prod.cloudops.mozgcp.netUnited States
                                                                                                                            15169GOOGLEUSfalse
                                                                                                                            172.217.23.110
                                                                                                                            youtube.comUnited States
                                                                                                                            15169GOOGLEUSfalse
                                                                                                                            35.244.181.201
                                                                                                                            prod.balrog.prod.cloudops.mozgcp.netUnited States
                                                                                                                            15169GOOGLEUSfalse
                                                                                                                            34.117.188.166
                                                                                                                            contile.services.mozilla.comUnited States
                                                                                                                            139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
                                                                                                                            151.101.193.91
                                                                                                                            services.addons.mozilla.orgUnited States
                                                                                                                            54113FASTLYUSfalse
                                                                                                                            35.201.103.21
                                                                                                                            normandy-cdn.services.mozilla.comUnited States
                                                                                                                            15169GOOGLEUSfalse
                                                                                                                            35.190.72.216
                                                                                                                            prod.classify-client.prod.webservices.mozgcp.netUnited States
                                                                                                                            15169GOOGLEUSfalse
                                                                                                                            34.160.144.191
                                                                                                                            prod.content-signature-chains.prod.webservices.mozgcp.netUnited States
                                                                                                                            2686ATGS-MMD-ASUSfalse
                                                                                                                            34.120.208.123
                                                                                                                            telemetry-incoming.r53-2.services.mozilla.comUnited States
                                                                                                                            15169GOOGLEUSfalse
                                                                                                                            IP
                                                                                                                            127.0.0.1
                                                                                                                            Joe Sandbox version:41.0.0 Charoite
                                                                                                                            Analysis ID:1545679
                                                                                                                            Start date and time:2024-10-30 20:38:05 +01:00
                                                                                                                            Joe Sandbox product:CloudBasic
                                                                                                                            Overall analysis duration:0h 6m 49s
                                                                                                                            Hypervisor based Inspection enabled:false
                                                                                                                            Report type:full
                                                                                                                            Cookbook file name:default.jbs
                                                                                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                            Number of analysed new started processes analysed:22
                                                                                                                            Number of new started drivers analysed:0
                                                                                                                            Number of existing processes analysed:0
                                                                                                                            Number of existing drivers analysed:0
                                                                                                                            Number of injected processes analysed:0
                                                                                                                            Technologies:
                                                                                                                            • HCA enabled
                                                                                                                            • EGA enabled
                                                                                                                            • AMSI enabled
                                                                                                                            Analysis Mode:default
                                                                                                                            Analysis stop reason:Timeout
                                                                                                                            Sample name:file.exe
                                                                                                                            Detection:MAL
                                                                                                                            Classification:mal72.troj.evad.winEXE@34/34@65/12
                                                                                                                            EGA Information:
                                                                                                                            • Successful, ratio: 50%
                                                                                                                            HCA Information:
                                                                                                                            • Successful, ratio: 95%
                                                                                                                            • Number of executed functions: 41
                                                                                                                            • Number of non-executed functions: 312
                                                                                                                            Cookbook Comments:
                                                                                                                            • Found application associated with file extension: .exe
                                                                                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                                                            • Excluded IPs from analysis (whitelisted): 35.160.212.113, 52.11.191.138, 54.185.230.140, 142.250.186.174, 2.22.61.56, 2.22.61.59, 142.250.185.206, 142.250.185.202, 142.250.186.170
                                                                                                                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, shavar.prod.mozaws.net, ciscobinary.openh264.org, slscr.update.microsoft.com, otelrules.azureedge.net, incoming.telemetry.mozilla.org, ctldl.windowsupdate.com, a17.rackcdn.com.mdc.edgesuite.net, detectportal.prod.mozaws.net, aus5.mozilla.org, fe3cr.delivery.mp.microsoft.com, a19.dscg10.akamai.net, ocsp.digicert.com, redirector.gvt1.com, safebrowsing.googleapis.com, location.services.mozilla.com
                                                                                                                            • Not all processes where analyzed, report is missing behavior information
                                                                                                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                                            • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                                            • Report size getting too big, too many NtCreateFile calls found.
                                                                                                                            • Report size getting too big, too many NtOpenFile calls found.
                                                                                                                            • VT rate limit hit for: file.exe
                                                                                                                            TimeTypeDescription
                                                                                                                            15:39:05API Interceptor1x Sleep call for process: firefox.exe modified
                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                            34.117.188.166file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                151.101.193.91file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                    34.149.100.209file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                        34.160.144.191file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                            services.addons.mozilla.orgfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.129.91
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.65.91
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.65.91
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.65.91
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.193.91
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.65.91
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.193.91
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.193.91
                                                                                                                                                                                                            example.orgfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                                            star-mini.c10r.facebook.comfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 157.240.251.35
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 157.240.253.35
                                                                                                                                                                                                            Reminders for Msp-partner_ Server Alert.emlGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                            • 157.240.253.35
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 157.240.253.35
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 157.240.0.35
                                                                                                                                                                                                            https://wetransfer.com/downloads/bd15c1f671ae60c5a56e558eb8cc43bf20241030150256/3b30cd5b9ce1ffb29d79c9118153941c20241030150256/70baef?t_exp=1730559776&t_lsid=6bd545a9-d09b-4abd-a317-124dbe9fe64d&t_network=email&t_rid=YXV0aDB8NjZlYWI0YTExODhmYzc1OGMzMmNiODIx&t_s=download_link&t_ts=1730300576&utm_campaign=TRN_TDL_01&utmGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                            • 157.240.251.35
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 157.240.251.35
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 157.240.253.35
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 157.240.0.35
                                                                                                                                                                                                            https://www.guidedtrack.com/programs/n5snx1a/runGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                            • 157.240.253.35
                                                                                                                                                                                                            twitter.comfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 104.244.42.129
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 104.244.42.1
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 104.244.42.193
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 104.244.42.193
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 104.244.42.193
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 104.244.42.65
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 104.244.42.65
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 104.244.42.129
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 104.244.42.65
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 104.244.42.129
                                                                                                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                            GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                                                            FormulariomillasbonusLATAM_GsqrekXCVBmUf.cmdGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                            • 34.117.59.81
                                                                                                                                                                                                            172.104.150.66.ps1Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                            • 34.117.59.81
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                                                            https://www.mediafire.com/file/oyfycncwen0a3ue/DSP_Plan_Set.zip/fileGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                            • 34.117.239.71
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                                                            FASTLYUShttps://pub-6838e3dd185d4df89d3bb3eabe6469a4.r2.dev/index.html#Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                            • 151.101.2.137
                                                                                                                                                                                                            https:/click.mailchimp.com/track/click/30010842/docsend.com?p=eyJzIjoiT2RaN0hwNHlyY2E3VXl5TWcwMlA2eFpHVlN3IiwidiI6MSwicCI6IntcInVcIjozMDAxMDg0MixcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL2RvY3NlbmQuY29tXFxcL3ZpZXdcXFwvZzZnYzZjazdtNHlkYTRpa1wiLFwiaWRcIjpcImNhZDg3NzI1Y2UzMjRiMzI4Yzk1ZGVkYWUyMzc4ZTZjXCIsXCJ1cmxfaWRzXCI6W1wiYzE5ZWU5NGJiMzA5YmZhOGQ2MDU3OGI1Mjk5NTFmOWE4NDQ0ODNhYVwiXX0ifQ#steven.davis@tu.eduGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                            • 151.101.66.137
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.129.91
                                                                                                                                                                                                            Access Audits -System #6878.msgGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                            • 151.101.1.229
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.65.91
                                                                                                                                                                                                            (No subject) (100).emlGet hashmaliciousTycoon2FABrowse
                                                                                                                                                                                                            • 151.101.2.137
                                                                                                                                                                                                            Reminders for Msp-partner_ Server Alert.emlGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                            • 151.101.2.137
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.65.91
                                                                                                                                                                                                            https://apollomicsinc-my.sharepoint.com/:u:/p/peony_yu/EThcAjzaTWNPs4NpIP1X0v0BUe4pmKNB9s6TANBDk5EDeA?rtime=8VndtY_33EgGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                            • 151.101.2.137
                                                                                                                                                                                                            ATGS-MMD-ASUSfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            https://www.mediafire.com/file/oyfycncwen0a3ue/DSP_Plan_Set.zip/fileGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                            • 34.1.246.194
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                            fb0aa01abe9d8e4037eb3473ca6e2dcafile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.193.91
                                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.193.91
                                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.193.91
                                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.193.91
                                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.193.91
                                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.193.91
                                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.193.91
                                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.193.91
                                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.193.91
                                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                                                            • 151.101.193.91
                                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                            C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmpfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):7813
                                                                                                                                                                                                                                                    Entropy (8bit):5.1813201730866165
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:192:7sjMihihMhXcbhbVbTbfbRbObtbyEl7nMrIJA6WnSrDtTUd/SkDrCw:QYyyYXcNhnzFSJsr7BnSrDhUd/r
                                                                                                                                                                                                                                                    MD5:771513F5BDEF449FE21510F7B5B0D2E8
                                                                                                                                                                                                                                                    SHA1:9E4B38D31B10CAF948521F29C5A64E26061975C8
                                                                                                                                                                                                                                                    SHA-256:E04521110190E736456DD8EB0BDCE9C56194615076E5A31817F092226CD04F59
                                                                                                                                                                                                                                                    SHA-512:4866C5CA45084D6097B6C9750310CD747B69EF0DECB537C8F4C45D55833CDE0EF8D85EE9DF244EE7BF9292F0C87D08BA2C1D3FE9AE48AD2EA60F855A2C788B5C
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:{"type":"uninstall","id":"255b4412-0df3-4832-be32-5037f020fd1a","creationDate":"2024-10-30T20:47:05.566Z","version":4,"application":{"architecture":"x86-64","buildId":"20230927232528","name":"Firefox","version":"118.0.1","displayVersion":"118.0.1","vendor":"Mozilla","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","channel":"release"},"payload":{"otherInstalls":0},"clientId":"65e71c9e-6ac3-4903-9066-b134350de32c","environment":{"build":{"applicationId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","applicationName":"Firefox","architecture":"x86-64","buildId":"20230927232528","version":"118.0.1","vendor":"Mozilla","displayVersion":"118.0.1","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","updaterAvailable":true},"partner":{"distributionId":null,"distributionVersion":null,"partnerId":null,"distributor":null,"distributorChannel":null,"partnerNames":[]},"system":{"memoryMB":8191,"virtualMaxMB":134217728,"cpu":{"isWindowsSMode":false,"count":4,"cores":2,"vendor":"GenuineIntel","name":"I
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):7813
                                                                                                                                                                                                                                                    Entropy (8bit):5.1813201730866165
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:192:7sjMihihMhXcbhbVbTbfbRbObtbyEl7nMrIJA6WnSrDtTUd/SkDrCw:QYyyYXcNhnzFSJsr7BnSrDhUd/r
                                                                                                                                                                                                                                                    MD5:771513F5BDEF449FE21510F7B5B0D2E8
                                                                                                                                                                                                                                                    SHA1:9E4B38D31B10CAF948521F29C5A64E26061975C8
                                                                                                                                                                                                                                                    SHA-256:E04521110190E736456DD8EB0BDCE9C56194615076E5A31817F092226CD04F59
                                                                                                                                                                                                                                                    SHA-512:4866C5CA45084D6097B6C9750310CD747B69EF0DECB537C8F4C45D55833CDE0EF8D85EE9DF244EE7BF9292F0C87D08BA2C1D3FE9AE48AD2EA60F855A2C788B5C
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:{"type":"uninstall","id":"255b4412-0df3-4832-be32-5037f020fd1a","creationDate":"2024-10-30T20:47:05.566Z","version":4,"application":{"architecture":"x86-64","buildId":"20230927232528","name":"Firefox","version":"118.0.1","displayVersion":"118.0.1","vendor":"Mozilla","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","channel":"release"},"payload":{"otherInstalls":0},"clientId":"65e71c9e-6ac3-4903-9066-b134350de32c","environment":{"build":{"applicationId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","applicationName":"Firefox","architecture":"x86-64","buildId":"20230927232528","version":"118.0.1","vendor":"Mozilla","displayVersion":"118.0.1","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","updaterAvailable":true},"partner":{"distributionId":null,"distributionVersion":null,"partnerId":null,"distributor":null,"distributorChannel":null,"partnerNames":[]},"system":{"memoryMB":8191,"virtualMaxMB":134217728,"cpu":{"isWindowsSMode":false,"count":4,"cores":2,"vendor":"GenuineIntel","name":"I
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):32768
                                                                                                                                                                                                                                                    Entropy (8bit):0.4593089050301797
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:48:9SP0nUgwyZXYI65yFRX2D3GNTTfyn0Mk1iA:9SDKaIjo3UzyE1L
                                                                                                                                                                                                                                                    MD5:D910AD167F0217587501FDCDB33CC544
                                                                                                                                                                                                                                                    SHA1:2F57441CEFDC781011B53C1C5D29AC54835AFC1D
                                                                                                                                                                                                                                                    SHA-256:E3699D9404A3FFC1AFF0CA8A3972DC0EF38BDAB927741E9F627C7C55CEA42E81
                                                                                                                                                                                                                                                    SHA-512:F1871BF28FF25EE52BDB99C7A80AB715C7CAC164DCD2FD87E681168EE927FD2C5E80E03C91BB638D955A4627213BF575FF4D9EECAEDA7718C128CF2CE8F7CB3D
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:... ftypisom....isomiso2avc1mp41....free....mdat..........E...H..,. .#..x264 - core 152 r2851 ba24899 - H.264/MPEG-4 AVC codec - Copyleft 2003-2017 - http://www.videolan.org/x264.html - options: cabac=1 ref=3 deblock=1:0:0 analyse=0x3:0x113 me=hex subme=7 psy=1 psy_rd=1.00:0.00 mixed_ref=1 me_range=16 chroma_me=1 trellis=1 8x8dct=1 cqm=0 deadzone=21,11 fast_pskip=1 chroma_qp_offset=-2 threads=4 lookahead_threads=1 sliced_threads=0 nr=0 decimate=1 interlaced=0 bluray_compat=0 constrained_intra=0 bframes=3 b_pyramid=2 b_adapt=1 b_bias=0 direct=1 weightb=1 open_gop=0 weightp=2 keyint=250 keyint_min=25 scenecut=40 intra_refresh=0 rc_lookahead=40 rc=crf mbtree=1 crf=23.0 qcomp=0.60 qpmin=0 qpmax=69 qpstep=4 ip_ratio=1.40 aq=1:1.00......e...+...s|.kG3...'.u.."...,J.w.~.d\..(K....!.+..;....h....(.T.*...M......0..~L..8..B..A.y..R..,.zBP.';j.@.].w..........c......C=.'f....gI.$^.......m5V.L...{U..%V[....8......B..i..^,....:...,..5.m.%dA....moov...lmvhd...................(...........
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):453023
                                                                                                                                                                                                                                                    Entropy (8bit):7.997718157581587
                                                                                                                                                                                                                                                    Encrypted:true
                                                                                                                                                                                                                                                    SSDEEP:12288:tESTeqTI2r4ZbCgUKWKNeRcPMb6qlV7hVZe3:tEsed2Xh9/bdzZe3
                                                                                                                                                                                                                                                    MD5:85430BAED3398695717B0263807CF97C
                                                                                                                                                                                                                                                    SHA1:FFFBEE923CEA216F50FCE5D54219A188A5100F41
                                                                                                                                                                                                                                                    SHA-256:A9F4281F82B3579581C389E8583DC9F477C7FD0E20C9DFC91A2E611E21E3407E
                                                                                                                                                                                                                                                    SHA-512:06511F1F6C6D44D076B3C593528C26A602348D9C41689DBF5FF716B671C3CA5756B12CB2E5869F836DEDCE27B1A5CFE79B93C707FD01F8E84B620923BB61B5F1
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:PK.........bN...R..........gmpopenh264.dll..|.E.0.=..I.....1....4f1q.`.........q.....'+....h*m{.z..o_.{w........$..($A!...|L...B&A2.s.{..Dd......c.U.U..9u.S...K.l`...../.d.-....|.....&....9......wn..x......i.#O.+.Y.l......+....,3.3f..\..c.SSS,............N...GG...F.'.&.:'.K.Z&.>.@.g..M...M.`...*.........ZR....^jg.G.Kb.o~va.....<Z..1.#.O.e.....D..X..i..$imBW..Q&.......P.....,M.,..:.c...-...\......*.....-i.K.I..4.a..6..*...Ov=...W..F.CH.>...a.'.x...#@f...d..u.1....OV.1o}....g.5.._.3.J.Hi.Z.ipM....b.Z....%.G..F................/..3.q..J.....o...%.g.N.*.}..).3.N%.!..q*........^I.m..~...6.#.~+.....A...I]r...x..*.<IYj....p0..`S.M@.E..f.=.;!.@.....E..E....... .0.n....Jd..d......uM.-.qI.lR..z..=}..r.D.XLZ....x.$..|c.1.cUkM.&.Qn]..a]t.h..*.!.6 7..Jd.DvKJ"Wgd*%n...w...Jni.inmr.@M.$'Z.s....#)%..Rs..:.h....R....\..t.6..'.g.........Uj+F.cr:|..!..K.W.Y...17......,....r.....>.N..3.R.Y.._\...Ir.DNJdM... .k...&V-....z.%...-...D..i..&...6....7.2T).>..0..%.&.
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):3621
                                                                                                                                                                                                                                                    Entropy (8bit):4.931606558476108
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:96:8S+OfJQPUFpOdwNIOdYVjvYcXaNLFGZ8P:8S+OBIUjOdwiOdYVjjwLFGZ8P
                                                                                                                                                                                                                                                    MD5:EA3850EFEF6CD49404F9CE52E8E0004A
                                                                                                                                                                                                                                                    SHA1:4143B91019D81BD43A2E457EF1E5EFCFBE4D77EC
                                                                                                                                                                                                                                                    SHA-256:0BF33C85961871175B054535E33A3135A891C46CE878CB86F68205519875255B
                                                                                                                                                                                                                                                    SHA-512:16BC4891214CF19CD21278AF57AFC39F06E427378A94DC0C2482EA43DCF2331EF99EC44A4CF37DAD861D1AE4E89E388211E9E12A6E7D10796FE1096EA0319667
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:{"csv-import-release-rollout":{"slug":"csv-import-release-rollout","branch":{"slug":"enable-csv-import","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"csvImport":true},"enabled":true,"featureId":"cm-csv-import"}]},"active":true,"enrollmentId":"c5d95379-f4ee-4629-a507-6f15a0e93cd4","experimentType":"rollout","source":"rs-loader","userFacingName":"CSV Import (Release Rollout)","userFacingDescription":"This rollout enables users to import logins from a CSV file from the about:logins page.","lastSeen":"2023-10-03T11:50:29.548Z","featureIds":["cm-csv-import"],"prefs":[{"name":"signon.management.page.fileImport.enabled","branch":"default","featureId":"cm-csv-import","variable":"csvImport","originalValue":false}],"isRollout":true},"serp-ad-telemetry-rollout":{"slug":"serp-ad-telemetry-rollout","branch":{"slug":"control","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pr
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):3621
                                                                                                                                                                                                                                                    Entropy (8bit):4.931606558476108
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:96:8S+OfJQPUFpOdwNIOdYVjvYcXaNLFGZ8P:8S+OBIUjOdwiOdYVjjwLFGZ8P
                                                                                                                                                                                                                                                    MD5:EA3850EFEF6CD49404F9CE52E8E0004A
                                                                                                                                                                                                                                                    SHA1:4143B91019D81BD43A2E457EF1E5EFCFBE4D77EC
                                                                                                                                                                                                                                                    SHA-256:0BF33C85961871175B054535E33A3135A891C46CE878CB86F68205519875255B
                                                                                                                                                                                                                                                    SHA-512:16BC4891214CF19CD21278AF57AFC39F06E427378A94DC0C2482EA43DCF2331EF99EC44A4CF37DAD861D1AE4E89E388211E9E12A6E7D10796FE1096EA0319667
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:{"csv-import-release-rollout":{"slug":"csv-import-release-rollout","branch":{"slug":"enable-csv-import","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"csvImport":true},"enabled":true,"featureId":"cm-csv-import"}]},"active":true,"enrollmentId":"c5d95379-f4ee-4629-a507-6f15a0e93cd4","experimentType":"rollout","source":"rs-loader","userFacingName":"CSV Import (Release Rollout)","userFacingDescription":"This rollout enables users to import logins from a CSV file from the about:logins page.","lastSeen":"2023-10-03T11:50:29.548Z","featureIds":["cm-csv-import"],"prefs":[{"name":"signon.management.page.fileImport.enabled","branch":"default","featureId":"cm-csv-import","variable":"csvImport","originalValue":false}],"isRollout":true},"serp-ad-telemetry-rollout":{"slug":"serp-ad-telemetry-rollout","branch":{"slug":"control","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pr
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:Mozilla lz4 compressed data, originally 23432 bytes
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):5312
                                                                                                                                                                                                                                                    Entropy (8bit):6.615424734763731
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:96:V2YbKsKNU2xWrp327tGmD4wBON6h6cHaJVJuZMd0JGkkrw2D:VTx2x2t0FDJ4NpwZMd0EJws
                                                                                                                                                                                                                                                    MD5:1B9C8056D3619CE5A8C59B0C09873F17
                                                                                                                                                                                                                                                    SHA1:1015C630E1937AA63F6AB31743782ECB5D78CCD8
                                                                                                                                                                                                                                                    SHA-256:A6AE5DE0733FED050AB570AD9374FF4593D554F695B5AE4E2495871D171D34A3
                                                                                                                                                                                                                                                    SHA-512:B1DC9CC675D5476C270A2D5B214D3DF2B3856576ED7EFE92D9A606C2D9D34E781018902AE75CE9C1E25007BB7F8D8F7B52997E6F05B845EF44BAF22F614FE899
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:mozLz40..[....{"app-system-defaults":{"addon....formautofill@mozilla.org&..Gdependencies":[],"enabled":true,"lastModifiedTime":1695865283000,"loader":null,"path":s.....xpi","recommendationStateA...rootURI":"jar:file:///C:/Program%20Files/M.......refox/browser/features/...... !/...unInSafeMode..wsignedD...telemetryKey..7%40R...:1.0.1","version":"..`},"pic..#in.....T.n..w...........S.......(.[......0....0"},"screenshots..T.r.....[.......(.V....-39.......},"webcompat-reporter...Ofals..&.z.....[.......(.]....=1.5.............<.)....p....d......1.z.!18...5.....startupData...pX.astentL..!er...webRequest%..onBefore...[[{"incognitoi.UtabId..!yp...."main_frame"],"url...."*://login.microsoftonline.com/*","..@us/*L.dwindows...},["blocking"]],...Iimag...https://smartT.".f.....etp/facebook.svg",...Aplay*....8`script...P.....-....-testbed.herokuapp\.`shims_..3.jsh.bexampl|.......Pexten{..Q../?..s...S.J/_2..@&_3U..s7.addthis . ic...officialK......-angularjs/current/dist(..t.min.js...track.adB...net/s
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:Mozilla lz4 compressed data, originally 23432 bytes
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):5312
                                                                                                                                                                                                                                                    Entropy (8bit):6.615424734763731
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:96:V2YbKsKNU2xWrp327tGmD4wBON6h6cHaJVJuZMd0JGkkrw2D:VTx2x2t0FDJ4NpwZMd0EJws
                                                                                                                                                                                                                                                    MD5:1B9C8056D3619CE5A8C59B0C09873F17
                                                                                                                                                                                                                                                    SHA1:1015C630E1937AA63F6AB31743782ECB5D78CCD8
                                                                                                                                                                                                                                                    SHA-256:A6AE5DE0733FED050AB570AD9374FF4593D554F695B5AE4E2495871D171D34A3
                                                                                                                                                                                                                                                    SHA-512:B1DC9CC675D5476C270A2D5B214D3DF2B3856576ED7EFE92D9A606C2D9D34E781018902AE75CE9C1E25007BB7F8D8F7B52997E6F05B845EF44BAF22F614FE899
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:mozLz40..[....{"app-system-defaults":{"addon....formautofill@mozilla.org&..Gdependencies":[],"enabled":true,"lastModifiedTime":1695865283000,"loader":null,"path":s.....xpi","recommendationStateA...rootURI":"jar:file:///C:/Program%20Files/M.......refox/browser/features/...... !/...unInSafeMode..wsignedD...telemetryKey..7%40R...:1.0.1","version":"..`},"pic..#in.....T.n..w...........S.......(.[......0....0"},"screenshots..T.r.....[.......(.V....-39.......},"webcompat-reporter...Ofals..&.z.....[.......(.]....=1.5.............<.)....p....d......1.z.!18...5.....startupData...pX.astentL..!er...webRequest%..onBefore...[[{"incognitoi.UtabId..!yp...."main_frame"],"url...."*://login.microsoftonline.com/*","..@us/*L.dwindows...},["blocking"]],...Iimag...https://smartT.".f.....etp/facebook.svg",...Aplay*....8`script...P.....-....-testbed.herokuapp\.`shims_..3.jsh.bexampl|.......Pexten{..Q../?..s...S.J/_2..@&_3U..s7.addthis . ic...officialK......-angularjs/current/dist(..t.min.js...track.adB...net/s
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):24
                                                                                                                                                                                                                                                    Entropy (8bit):3.91829583405449
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:3:YWGifTJE6iHQ:YWGif9EE
                                                                                                                                                                                                                                                    MD5:3088F0272D29FAA42ED452C5E8120B08
                                                                                                                                                                                                                                                    SHA1:C72AA542EF60AFA3DF5DFE1F9FCC06C0B135BE23
                                                                                                                                                                                                                                                    SHA-256:D587CEC944023447DC91BC5F71E2291711BA5ADD337464837909A26F34BC5A06
                                                                                                                                                                                                                                                    SHA-512:B662414EDD6DEF8589304904263584847586ECCA0B0E6296FB3ADB2192D92FB48697C99BD27C4375D192150E3F99102702AF2391117FFF50A9763C74C193D798
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:{"schema":6,"addons":[]}
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):24
                                                                                                                                                                                                                                                    Entropy (8bit):3.91829583405449
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:3:YWGifTJE6iHQ:YWGif9EE
                                                                                                                                                                                                                                                    MD5:3088F0272D29FAA42ED452C5E8120B08
                                                                                                                                                                                                                                                    SHA1:C72AA542EF60AFA3DF5DFE1F9FCC06C0B135BE23
                                                                                                                                                                                                                                                    SHA-256:D587CEC944023447DC91BC5F71E2291711BA5ADD337464837909A26F34BC5A06
                                                                                                                                                                                                                                                    SHA-512:B662414EDD6DEF8589304904263584847586ECCA0B0E6296FB3ADB2192D92FB48697C99BD27C4375D192150E3F99102702AF2391117FFF50A9763C74C193D798
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:{"schema":6,"addons":[]}
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):262144
                                                                                                                                                                                                                                                    Entropy (8bit):0.04905391753567332
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:24:DLivwae+Q8Uu50xj0aWe9LxYkKA25Q5tvAA:D6wae+QtMImelekKDa5
                                                                                                                                                                                                                                                    MD5:DD9D28E87ED57D16E65B14501B4E54D1
                                                                                                                                                                                                                                                    SHA1:793839B47326441BE2D1336BA9A61C9B948C578D
                                                                                                                                                                                                                                                    SHA-256:BB4E6C58C50BD6399ED70468C02B584595C29F010B66F864CD4D6B427FA365BC
                                                                                                                                                                                                                                                    SHA-512:A2626F6A3CBADE62E38DA5987729D99830D0C6AA134D4A9E615026A5F18ACBB11A2C3C80917DAD76DA90ED5BAA9B0454D4A3C2DD04436735E78C974BA1D035B1
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:SQLite format 3......@ ..........................................................................j......|....~.}.}z}-|.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:Mozilla lz4 compressed data, originally 56 bytes
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):66
                                                                                                                                                                                                                                                    Entropy (8bit):4.837595020998689
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:3:3fX/xH8IXl/I3v0lb7iioW:vXpH1RPXt
                                                                                                                                                                                                                                                    MD5:A6338865EB252D0EF8FCF11FA9AF3F0D
                                                                                                                                                                                                                                                    SHA1:CECDD4C4DCAE10C2FFC8EB938121B6231DE48CD3
                                                                                                                                                                                                                                                    SHA-256:078648C042B9B08483CE246B7F01371072541A2E90D1BEB0C8009A6118CBD965
                                                                                                                                                                                                                                                    SHA-512:D950227AC83F4E8246D73F9F35C19E88CE65D0CA5F1EF8CCBB02ED6EFC66B1B7E683E2BA0200279D7CA4B49831FD8C3CEB0584265B10ACCFF2611EC1CA8C0C6C
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:mozLz40.8.....{"v":1,"crashes":{},"countsByDay....rruptDate":null}
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:Mozilla lz4 compressed data, originally 56 bytes
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):66
                                                                                                                                                                                                                                                    Entropy (8bit):4.837595020998689
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:3:3fX/xH8IXl/I3v0lb7iioW:vXpH1RPXt
                                                                                                                                                                                                                                                    MD5:A6338865EB252D0EF8FCF11FA9AF3F0D
                                                                                                                                                                                                                                                    SHA1:CECDD4C4DCAE10C2FFC8EB938121B6231DE48CD3
                                                                                                                                                                                                                                                    SHA-256:078648C042B9B08483CE246B7F01371072541A2E90D1BEB0C8009A6118CBD965
                                                                                                                                                                                                                                                    SHA-512:D950227AC83F4E8246D73F9F35C19E88CE65D0CA5F1EF8CCBB02ED6EFC66B1B7E683E2BA0200279D7CA4B49831FD8C3CEB0584265B10ACCFF2611EC1CA8C0C6C
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:mozLz40.8.....{"v":1,"crashes":{},"countsByDay....rruptDate":null}
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):36830
                                                                                                                                                                                                                                                    Entropy (8bit):5.185924656884556
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:768:wI43DvfWXf4E6C4p4EC4Y4QfEWvM4B4QS4z4444XQ4U:wUfdvk
                                                                                                                                                                                                                                                    MD5:5656BA69BD2966108A461AAE35F60226
                                                                                                                                                                                                                                                    SHA1:9C2E5AE52D82CEA43C4A5FFF205A7700CF54D61C
                                                                                                                                                                                                                                                    SHA-256:587596712960B26EAC18CB354CCD633FFDB218E374A9D59EFEA843914D7AB299
                                                                                                                                                                                                                                                    SHA-512:38F715AD9156558B5D57CA2E75FB0FFE0C5C6728BD94484B8F15E090120DDD02DCE42DBC9CC7143AD6552460A5F3A40E577FAF1D76D5D40B25CDBE636F250054
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:{"schemaVersion":35,"addons":[{"id":"formautofill@mozilla.org","syncGUID":"{60024e8e-cfd0-41e5-965d-7128c7dcf0e8}","version":"1.0.1","type":"extension","loader":null,"updateURL":null,"installOrigins":null,"manifestVersion":2,"optionsURL":null,"optionsType":null,"optionsBrowserStyle":true,"aboutURL":null,"defaultLocale":{"name":"Form Autofill","creator":null,"developers":null,"translators":null,"contributors":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"embedderDisabled":false,"installDate":1695865283000,"updateDate":1695865283000,"applyBackgroundUpdates":1,"path":"C:\\Program Files\\Mozilla Firefox\\browser\\features\\formautofill@mozilla.org.xpi","skinnable":false,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"strictCompatibility":true,"locales":[],"targetApplications":[{"id":"toolkit@mozilla.org","minVersion":null,"maxVersion":null}],"targetPlatforms":[],"signedDate":null,"seen":true,"dependencies":[],"incognito":"
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):36830
                                                                                                                                                                                                                                                    Entropy (8bit):5.185924656884556
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:768:wI43DvfWXf4E6C4p4EC4Y4QfEWvM4B4QS4z4444XQ4U:wUfdvk
                                                                                                                                                                                                                                                    MD5:5656BA69BD2966108A461AAE35F60226
                                                                                                                                                                                                                                                    SHA1:9C2E5AE52D82CEA43C4A5FFF205A7700CF54D61C
                                                                                                                                                                                                                                                    SHA-256:587596712960B26EAC18CB354CCD633FFDB218E374A9D59EFEA843914D7AB299
                                                                                                                                                                                                                                                    SHA-512:38F715AD9156558B5D57CA2E75FB0FFE0C5C6728BD94484B8F15E090120DDD02DCE42DBC9CC7143AD6552460A5F3A40E577FAF1D76D5D40B25CDBE636F250054
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:{"schemaVersion":35,"addons":[{"id":"formautofill@mozilla.org","syncGUID":"{60024e8e-cfd0-41e5-965d-7128c7dcf0e8}","version":"1.0.1","type":"extension","loader":null,"updateURL":null,"installOrigins":null,"manifestVersion":2,"optionsURL":null,"optionsType":null,"optionsBrowserStyle":true,"aboutURL":null,"defaultLocale":{"name":"Form Autofill","creator":null,"developers":null,"translators":null,"contributors":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"embedderDisabled":false,"installDate":1695865283000,"updateDate":1695865283000,"applyBackgroundUpdates":1,"path":"C:\\Program Files\\Mozilla Firefox\\browser\\features\\formautofill@mozilla.org.xpi","skinnable":false,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"strictCompatibility":true,"locales":[],"targetApplications":[{"id":"toolkit@mozilla.org","minVersion":null,"maxVersion":null}],"targetPlatforms":[],"signedDate":null,"seen":true,"dependencies":[],"incognito":"
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):32768
                                                                                                                                                                                                                                                    Entropy (8bit):0.017262956703125623
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
                                                                                                                                                                                                                                                    MD5:B7C14EC6110FA820CA6B65F5AEC85911
                                                                                                                                                                                                                                                    SHA1:608EEB7488042453C9CA40F7E1398FC1A270F3F4
                                                                                                                                                                                                                                                    SHA-256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
                                                                                                                                                                                                                                                    SHA-512:D8D75760F29B1E27AC9430BC4F4FFCEC39F1590BE5AEF2BFB5A535850302E067C288EF59CF3B2C5751009A22A6957733F9F80FA18F2B0D33D90C068A3F08F3B0
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:..-.....................................8...5.....-.....................................8...5...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1021904
                                                                                                                                                                                                                                                    Entropy (8bit):6.648417932394748
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:vYLdTfFKbNSjv92eFN+3wH+NYriA0Iq6lh6VawYIpAvwHN/Uf1h47HAfg1oet:vYLdTZ923NYrjwNpgwef1hzfg1x
                                                                                                                                                                                                                                                    MD5:FE3355639648C417E8307C6D051E3E37
                                                                                                                                                                                                                                                    SHA1:F54602D4B4778DA21BC97C7238FC66AA68C8EE34
                                                                                                                                                                                                                                                    SHA-256:1ED7877024BE63A049DA98733FD282C16BD620530A4FB580DACEC3A78ACE914E
                                                                                                                                                                                                                                                    SHA-512:8F4030BB2464B98ECCBEA6F06EB186D7216932702D94F6B84C56419E9CF65A18309711AB342D1513BF85AED402BC3535A70DB4395874828F0D35C278DD2EAC9C
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                    Joe Sandbox View:
                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......NH...)...)...)..eM...)..eM...)..eM..)..eM...)...)..i)..XA...)..XA..;)..XA...)...)..g)..cA...)..cA...)..Rich.)..........PE..d....z\.........." .....t................................................................`.........................................P...,...|...(............P...H...z.................T...........................0...................p............................text...$s.......t.................. ..`.rdata...~...........x..............@..@.data....3..........................@....pdata...H...P...J..................@..@.rodata..............^..............@..@.reloc...............j..............@..B........................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1021904
                                                                                                                                                                                                                                                    Entropy (8bit):6.648417932394748
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12288:vYLdTfFKbNSjv92eFN+3wH+NYriA0Iq6lh6VawYIpAvwHN/Uf1h47HAfg1oet:vYLdTZ923NYrjwNpgwef1hzfg1x
                                                                                                                                                                                                                                                    MD5:FE3355639648C417E8307C6D051E3E37
                                                                                                                                                                                                                                                    SHA1:F54602D4B4778DA21BC97C7238FC66AA68C8EE34
                                                                                                                                                                                                                                                    SHA-256:1ED7877024BE63A049DA98733FD282C16BD620530A4FB580DACEC3A78ACE914E
                                                                                                                                                                                                                                                    SHA-512:8F4030BB2464B98ECCBEA6F06EB186D7216932702D94F6B84C56419E9CF65A18309711AB342D1513BF85AED402BC3535A70DB4395874828F0D35C278DD2EAC9C
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                    Joe Sandbox View:
                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......NH...)...)...)..eM...)..eM...)..eM..)..eM...)...)..i)..XA...)..XA..;)..XA...)...)..g)..cA...)..cA...)..Rich.)..........PE..d....z\.........." .....t................................................................`.........................................P...,...|...(............P...H...z.................T...........................0...................p............................text...$s.......t.................. ..`.rdata...~...........x..............@..@.data....3..........................@....pdata...H...P...J..................@..@.rodata..............^..............@..@.reloc...............j..............@..B........................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:ASCII text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):116
                                                                                                                                                                                                                                                    Entropy (8bit):4.968220104601006
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:3:C3OuN9RAM7VDXcEzq+rEakOvTMBv+FdBAIABv+FEn:0BDUmHlvAWeWEn
                                                                                                                                                                                                                                                    MD5:3D33CDC0B3D281E67DD52E14435DD04F
                                                                                                                                                                                                                                                    SHA1:4DB88689282FD4F9E9E6AB95FCBB23DF6E6485DB
                                                                                                                                                                                                                                                    SHA-256:F526E9F98841D987606EFEAFF7F3E017BA9FD516C4BE83890C7F9A093EA4C47B
                                                                                                                                                                                                                                                    SHA-512:A4A96743332CC8EF0F86BC2E6122618BFC75ED46781DADBAC9E580CD73DF89E74738638A2CCCB4CAA4CBBF393D771D7F2C73F825737CDB247362450A0D4A4BC1
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:Name: gmpopenh264.Description: GMP Plugin for OpenH264..Version: 1.8.1.APIs: encode-video[h264], decode-video[h264].
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:ASCII text
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):116
                                                                                                                                                                                                                                                    Entropy (8bit):4.968220104601006
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:3:C3OuN9RAM7VDXcEzq+rEakOvTMBv+FdBAIABv+FEn:0BDUmHlvAWeWEn
                                                                                                                                                                                                                                                    MD5:3D33CDC0B3D281E67DD52E14435DD04F
                                                                                                                                                                                                                                                    SHA1:4DB88689282FD4F9E9E6AB95FCBB23DF6E6485DB
                                                                                                                                                                                                                                                    SHA-256:F526E9F98841D987606EFEAFF7F3E017BA9FD516C4BE83890C7F9A093EA4C47B
                                                                                                                                                                                                                                                    SHA-512:A4A96743332CC8EF0F86BC2E6122618BFC75ED46781DADBAC9E580CD73DF89E74738638A2CCCB4CAA4CBBF393D771D7F2C73F825737CDB247362450A0D4A4BC1
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:Name: gmpopenh264.Description: GMP Plugin for OpenH264..Version: 1.8.1.APIs: encode-video[h264], decode-video[h264].
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):98304
                                                                                                                                                                                                                                                    Entropy (8bit):0.07338695179673393
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:12:DBl/A0OWla0mwPxRymgObsCVR45wcYR4fmnsCVR4zkinL:DLhesh7Owd4+jiL
                                                                                                                                                                                                                                                    MD5:2EA153D905768C44B5CB58C942ABA844
                                                                                                                                                                                                                                                    SHA1:85EFD24AD576D397CEE09A3C7BB1648DA58D98F2
                                                                                                                                                                                                                                                    SHA-256:3A85F3CB87136B8F66D467EAC110FFED43E6F4D10F104EFC521375737A2BA0B9
                                                                                                                                                                                                                                                    SHA-512:626A451E620C3209BFA9DFD6457B104B683D5166F207060887DFDEA0DBCA8FA6D5A7511A8BF8A80EA8BB226E0F0EEFE9898C0260B515FAAE0FF3EF71C3E72DA8
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:SQLite format 3......@ ..........................................................................j......~s..F~s........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):32768
                                                                                                                                                                                                                                                    Entropy (8bit):0.035615874395153645
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:3:GtlstFvW9n1QPPlYlstFvW9n1QPP///T89//alEl:GtWtUp1Q3lYWtUp1Q3/D89XuM
                                                                                                                                                                                                                                                    MD5:A6453A65668E99CAB0C20817496A7978
                                                                                                                                                                                                                                                    SHA1:68ADA9A93D660F57CE6214F57B111B18956D2934
                                                                                                                                                                                                                                                    SHA-256:694E7847073752BB70FD0298FA9B151D530159C6FC220C65892D34DDD1B4BA7B
                                                                                                                                                                                                                                                    SHA-512:68675FBA73E9B2509429CB295129C909F3BD3EA5932083584C164E4FEB596101B5F6DA089C78487ACD8661EAC1ED867B3DF3C05B53D190E9F0DD108B5949B295
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:..-........................./.!\q..E....:...Grn...-........................./.!\q..E....:...Grn.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:SQLite Write-Ahead Log, version 3007000
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):32824
                                                                                                                                                                                                                                                    Entropy (8bit):0.03965353112274345
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:3:Ol138gVrGgNUTD6Uiwl8rEXsxdwhml8XW3R2:KaQCxDXll8dMhm93w
                                                                                                                                                                                                                                                    MD5:D69087C8F0C7F074CC441415024404CB
                                                                                                                                                                                                                                                    SHA1:48048EC23C6699A79796456A83974DF7BEBCC968
                                                                                                                                                                                                                                                    SHA-256:26DEB68ED0BDB32355524C3DA1600AF4E6C6B398252BB0517F01D3FAC32E1084
                                                                                                                                                                                                                                                    SHA-512:754ABC77450FF445C4BB675489B64A4952B5ED1551E4F50FB40D135748E8072A38840F113A8B29B7E34C43C6FDF6C34EE8AEFC3FF3E1A23AD4F90655AEB5574D
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:7....-..........q..E.....r.............q..E........\!./................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:ASCII text, with very long lines (1809), with CRLF line terminators
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):13254
                                                                                                                                                                                                                                                    Entropy (8bit):5.4933499151167045
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:192:tnaRtLYbBp6AXhj4qyaaXp6KDINFev85RfGNBw8d0Sl:QeJ6q/0I00cwD0
                                                                                                                                                                                                                                                    MD5:F3598FDD635824175B038C8FDC1C7C37
                                                                                                                                                                                                                                                    SHA1:5FFC6C0C9424DF75C484946ACC777195A5DE3472
                                                                                                                                                                                                                                                    SHA-256:C2AC0EB98A59E6AC878B4863E6032F472A1A492FCDD7EC44F55939FF72F71875
                                                                                                                                                                                                                                                    SHA-512:D890C5CB5E8D479B7C44A53C043C0697845CF55D8860B8A0E0C6E7CF2175FACC6FDF29B3EEE3EDBD228C18E34D1434DB4EC588C2D428C5CDC7EBD91F980A052B
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:// Mozilla User Preferences....// DO NOT EDIT THIS FILE...//..// If you make changes to this file while the application is running,..// the changes will be overwritten when the application exits...//..// To change a preference value, you can either:..// - modify it via the UI (e.g. via about:config in the browser); or..// - set it within a user.js file in your profile.....user_pref("app.normandy.first_run", false);..user_pref("app.normandy.migrationsApplied", 12);..user_pref("app.normandy.user_id", "57f16a19-e119-4073-bf01-28f88011f783");..user_pref("app.update.auto.migrated", true);..user_pref("app.update.background.rolledout", true);..user_pref("app.update.backgroundErrors", 2);..user_pref("app.update.lastUpdateTime.addon-background-update-timer", 1730321195);..user_pref("app.update.lastUpdateTime.background-update-timer", 1730321195);..user_pref("app.update.lastUpdateTime.browser-cleanup-thumbnails", 1730321195);..user_pref("app.update.lastUpdateTime.recipe-client-addon-run", 173032
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:ASCII text, with very long lines (1809), with CRLF line terminators
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):13254
                                                                                                                                                                                                                                                    Entropy (8bit):5.4933499151167045
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:192:tnaRtLYbBp6AXhj4qyaaXp6KDINFev85RfGNBw8d0Sl:QeJ6q/0I00cwD0
                                                                                                                                                                                                                                                    MD5:F3598FDD635824175B038C8FDC1C7C37
                                                                                                                                                                                                                                                    SHA1:5FFC6C0C9424DF75C484946ACC777195A5DE3472
                                                                                                                                                                                                                                                    SHA-256:C2AC0EB98A59E6AC878B4863E6032F472A1A492FCDD7EC44F55939FF72F71875
                                                                                                                                                                                                                                                    SHA-512:D890C5CB5E8D479B7C44A53C043C0697845CF55D8860B8A0E0C6E7CF2175FACC6FDF29B3EEE3EDBD228C18E34D1434DB4EC588C2D428C5CDC7EBD91F980A052B
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:// Mozilla User Preferences....// DO NOT EDIT THIS FILE...//..// If you make changes to this file while the application is running,..// the changes will be overwritten when the application exits...//..// To change a preference value, you can either:..// - modify it via the UI (e.g. via about:config in the browser); or..// - set it within a user.js file in your profile.....user_pref("app.normandy.first_run", false);..user_pref("app.normandy.migrationsApplied", 12);..user_pref("app.normandy.user_id", "57f16a19-e119-4073-bf01-28f88011f783");..user_pref("app.update.auto.migrated", true);..user_pref("app.update.background.rolledout", true);..user_pref("app.update.backgroundErrors", 2);..user_pref("app.update.lastUpdateTime.addon-background-update-timer", 1730321195);..user_pref("app.update.lastUpdateTime.background-update-timer", 1730321195);..user_pref("app.update.lastUpdateTime.browser-cleanup-thumbnails", 1730321195);..user_pref("app.update.lastUpdateTime.recipe-client-addon-run", 173032
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):65536
                                                                                                                                                                                                                                                    Entropy (8bit):0.04062825861060003
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:6:ltBl/l4/WN1h4BEJYqWvLue3FMOrMZ0l:DBl/WuntfJiFxMZO
                                                                                                                                                                                                                                                    MD5:18F65713B07CB441E6A98655B726D098
                                                                                                                                                                                                                                                    SHA1:2CEFA32BC26B25BE81C411B60C9925CB0F1F8F88
                                                                                                                                                                                                                                                    SHA-256:B6C268E48546B113551A5AF9CA86BB6A462A512DE6C9289315E125CEB0FD8621
                                                                                                                                                                                                                                                    SHA-512:A6871076C7D7ED53B630F9F144ED04303AD54A2E60B94ECA2AA96964D1AB375EEFDCA86CE0D3EB0E9DBB81470C6BD159877125A080C95EB17E54A52427F805FB
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:SQLite format 3......@ ..........................................................................j.......x..x..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):90
                                                                                                                                                                                                                                                    Entropy (8bit):4.194538242412464
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:3:YVXKQJAyiVLQwJtJDBA+AJ2LKZXJ3YFwHY:Y9KQOy6Lb1BA+m2L69Yr
                                                                                                                                                                                                                                                    MD5:C4AB2EE59CA41B6D6A6EA911F35BDC00
                                                                                                                                                                                                                                                    SHA1:5942CD6505FC8A9DABA403B082067E1CDEFDFBC4
                                                                                                                                                                                                                                                    SHA-256:00AD9799527C3FD21F3A85012565EAE817490F3E0D417413BF9567BB5909F6A2
                                                                                                                                                                                                                                                    SHA-512:71EA16900479E6AF161E0AAD08C8D1E9DED5868A8D848E7647272F3002E2F2013E16382B677ABE3C6F17792A26293B9E27EC78E16F00BD24BA3D21072BD1CAE2
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:{"profile-after-change":true,"final-ui-startup":true,"sessionstore-windows-restored":true}
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):90
                                                                                                                                                                                                                                                    Entropy (8bit):4.194538242412464
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:3:YVXKQJAyiVLQwJtJDBA+AJ2LKZXJ3YFwHY:Y9KQOy6Lb1BA+m2L69Yr
                                                                                                                                                                                                                                                    MD5:C4AB2EE59CA41B6D6A6EA911F35BDC00
                                                                                                                                                                                                                                                    SHA1:5942CD6505FC8A9DABA403B082067E1CDEFDFBC4
                                                                                                                                                                                                                                                    SHA-256:00AD9799527C3FD21F3A85012565EAE817490F3E0D417413BF9567BB5909F6A2
                                                                                                                                                                                                                                                    SHA-512:71EA16900479E6AF161E0AAD08C8D1E9DED5868A8D848E7647272F3002E2F2013E16382B677ABE3C6F17792A26293B9E27EC78E16F00BD24BA3D21072BD1CAE2
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:{"profile-after-change":true,"final-ui-startup":true,"sessionstore-windows-restored":true}
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:Mozilla lz4 compressed data, originally 5861 bytes
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1576
                                                                                                                                                                                                                                                    Entropy (8bit):6.334045707441808
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:24:v+USUGlcAxSEKaLXnIgm/pnxQwRlszT5sKt0i3eHVQj6T3JamhujJlOHzIomNVrw:GUpOx/2nR6N3eHT3J4JlK8quR4
                                                                                                                                                                                                                                                    MD5:B15C4EE54C9F8CFF2BA8CA8C2E83F4D1
                                                                                                                                                                                                                                                    SHA1:0BA553BEF1178DBB47E19A74098FBA43202FBFA6
                                                                                                                                                                                                                                                    SHA-256:87F46592371B721FC0AD19FDD132861B8E3241B4AE1F74B807B4ABEDE7BD78F2
                                                                                                                                                                                                                                                    SHA-512:D6CB1E2F2336F5A2ACFF0B259A2257182E1E5B3A8559E697D29445B3A119AE1DC62D674A57F43C177156631CB85F5EA128CE1ED864FE643B06546F31F11F928C
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":6,"docshellUU...D"{f1558e2f-f401-46b0-951f-41f30f06db97}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":7,"persistK..+}],"lastAccessed":1730321200077,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2167541758....dth":1164,"height":891,"screenX":4...Y..Aizem..."maximize......BeforeMin...&..workspace9...1a5ccf63-1000-409f-b5c1-afec7f75d4d9","zD..1...Wm..l........j..:....1":{..jUpdate...8,"startTim..`165318...centCrash..B0},".....Dcook.. hoc..."addons.mozilla.org","valu...A8bad2467092e6ddeb0dfa9e5ea54d86d26790ca7ba2ce88d10cb4604fe726755","path":"/","na..a"taarI|.Recure...,`.Donly..eexpiry....170437,"originA
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:Mozilla lz4 compressed data, originally 5861 bytes
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1576
                                                                                                                                                                                                                                                    Entropy (8bit):6.334045707441808
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:24:v+USUGlcAxSEKaLXnIgm/pnxQwRlszT5sKt0i3eHVQj6T3JamhujJlOHzIomNVrw:GUpOx/2nR6N3eHT3J4JlK8quR4
                                                                                                                                                                                                                                                    MD5:B15C4EE54C9F8CFF2BA8CA8C2E83F4D1
                                                                                                                                                                                                                                                    SHA1:0BA553BEF1178DBB47E19A74098FBA43202FBFA6
                                                                                                                                                                                                                                                    SHA-256:87F46592371B721FC0AD19FDD132861B8E3241B4AE1F74B807B4ABEDE7BD78F2
                                                                                                                                                                                                                                                    SHA-512:D6CB1E2F2336F5A2ACFF0B259A2257182E1E5B3A8559E697D29445B3A119AE1DC62D674A57F43C177156631CB85F5EA128CE1ED864FE643B06546F31F11F928C
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":6,"docshellUU...D"{f1558e2f-f401-46b0-951f-41f30f06db97}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":7,"persistK..+}],"lastAccessed":1730321200077,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2167541758....dth":1164,"height":891,"screenX":4...Y..Aizem..."maximize......BeforeMin...&..workspace9...1a5ccf63-1000-409f-b5c1-afec7f75d4d9","zD..1...Wm..l........j..:....1":{..jUpdate...8,"startTim..`165318...centCrash..B0},".....Dcook.. hoc..."addons.mozilla.org","valu...A8bad2467092e6ddeb0dfa9e5ea54d86d26790ca7ba2ce88d10cb4604fe726755","path":"/","na..a"taarI|.Recure...,`.Donly..eexpiry....170437,"originA
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:Mozilla lz4 compressed data, originally 5861 bytes
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1576
                                                                                                                                                                                                                                                    Entropy (8bit):6.334045707441808
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:24:v+USUGlcAxSEKaLXnIgm/pnxQwRlszT5sKt0i3eHVQj6T3JamhujJlOHzIomNVrw:GUpOx/2nR6N3eHT3J4JlK8quR4
                                                                                                                                                                                                                                                    MD5:B15C4EE54C9F8CFF2BA8CA8C2E83F4D1
                                                                                                                                                                                                                                                    SHA1:0BA553BEF1178DBB47E19A74098FBA43202FBFA6
                                                                                                                                                                                                                                                    SHA-256:87F46592371B721FC0AD19FDD132861B8E3241B4AE1F74B807B4ABEDE7BD78F2
                                                                                                                                                                                                                                                    SHA-512:D6CB1E2F2336F5A2ACFF0B259A2257182E1E5B3A8559E697D29445B3A119AE1DC62D674A57F43C177156631CB85F5EA128CE1ED864FE643B06546F31F11F928C
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":6,"docshellUU...D"{f1558e2f-f401-46b0-951f-41f30f06db97}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":7,"persistK..+}],"lastAccessed":1730321200077,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2167541758....dth":1164,"height":891,"screenX":4...Y..Aizem..."maximize......BeforeMin...&..workspace9...1a5ccf63-1000-409f-b5c1-afec7f75d4d9","zD..1...Wm..l........j..:....1":{..jUpdate...8,"startTim..`165318...centCrash..B0},".....Dcook.. hoc..."addons.mozilla.org","valu...A8bad2467092e6ddeb0dfa9e5ea54d86d26790ca7ba2ce88d10cb4604fe726755","path":"/","na..a"taarI|.Recure...,`.Donly..eexpiry....170437,"originA
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):4096
                                                                                                                                                                                                                                                    Entropy (8bit):2.0836444556178684
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:24:JBwdh/cEUcR9PzNFPFHx/GJRBdkOrDcRB1trwDeAq2gRMyxr3:jnEUo9LXtR+JdkOnohYsl
                                                                                                                                                                                                                                                    MD5:8B40B1534FF0F4B533AF767EB5639A05
                                                                                                                                                                                                                                                    SHA1:63EDB539EA39AD09D701A36B535C4C087AE08CC9
                                                                                                                                                                                                                                                    SHA-256:AF275A19A5C2C682139266065D90C237282274D11C5619A121B7BDBDB252861B
                                                                                                                                                                                                                                                    SHA-512:54AF707698CED33C206B1B193DA414D630901762E88E37E99885A50D4D5F8DDC28367C9B401DFE251CF0552B4FA446EE28F78A97C9096AFB0F2898BFBB673B53
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):4537
                                                                                                                                                                                                                                                    Entropy (8bit):5.034534303613634
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:48:YrSAYnz6UQZpExB1+anOsW4Vh351VxWRzzc8eYMsku7f86SLAVL7if5FtsfAcbyk:yczyTEr5QFRzzcMvbw6KkCrrc2Rn27
                                                                                                                                                                                                                                                    MD5:D70583E50460DB37C273DF059FADE4C6
                                                                                                                                                                                                                                                    SHA1:28BBE016D5696EEB968EBDE63F20D2A6F8E7C317
                                                                                                                                                                                                                                                    SHA-256:D998F9151AB917D092552445E6175BAEF562D79673D4E4865C621F4527F51C2B
                                                                                                                                                                                                                                                    SHA-512:EB05F5916EC068CE2A72FC21639020B42B74461D60580069A55CCF2692AD1F4CDD8A0B4BF392688FBA23D09541C21C15420DFC932C1DBB51C29C5A54A22F913D
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:{"environment":{"locale":"en-US","localeLanguageCode":"en","browserSettings":{"update":{"channel":"release","enabled":true,"autoDownload":true,"background":true}},"attributionData":{"campaign":"%2528not%2Bset%2529","content":"%2528not%2Bset%2529","dlsource":"mozorg","dltoken":"cd09ae95-e2cf-4b8b-8929-791b0dd48cdd","experiment":"%2528not%2Bset%2529","medium":"referral","source":"www.google.com","ua":"chrome","variation":"%2528not%2Bset%2529"},"currentDate":"2024-10-30T20:46:19.747Z","profileAgeCreated":1696333826043,"usesFirefoxSync":false,"isFxAEnabled":true,"isFxASignedIn":false,"sync":{"desktopDevices":0,"mobileDevices":0,"totalDevices":0},"xpinstallEnabled":true,"addonsInfo":{"addons":{"formautofill@mozilla.org":{"version":"1.0.1","type":"extension","isSystem":true,"isWebExtension":true,"name":"Form Autofill","userDisabled":false,"installDate":"2023-09-28T01:41:23.000Z"},"pictureinpicture@mozilla.org":{"version":"1.0.0","type":"extension","isSystem":true,"isWebExtension":true,"name"
                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):4537
                                                                                                                                                                                                                                                    Entropy (8bit):5.034534303613634
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:48:YrSAYnz6UQZpExB1+anOsW4Vh351VxWRzzc8eYMsku7f86SLAVL7if5FtsfAcbyk:yczyTEr5QFRzzcMvbw6KkCrrc2Rn27
                                                                                                                                                                                                                                                    MD5:D70583E50460DB37C273DF059FADE4C6
                                                                                                                                                                                                                                                    SHA1:28BBE016D5696EEB968EBDE63F20D2A6F8E7C317
                                                                                                                                                                                                                                                    SHA-256:D998F9151AB917D092552445E6175BAEF562D79673D4E4865C621F4527F51C2B
                                                                                                                                                                                                                                                    SHA-512:EB05F5916EC068CE2A72FC21639020B42B74461D60580069A55CCF2692AD1F4CDD8A0B4BF392688FBA23D09541C21C15420DFC932C1DBB51C29C5A54A22F913D
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Preview:{"environment":{"locale":"en-US","localeLanguageCode":"en","browserSettings":{"update":{"channel":"release","enabled":true,"autoDownload":true,"background":true}},"attributionData":{"campaign":"%2528not%2Bset%2529","content":"%2528not%2Bset%2529","dlsource":"mozorg","dltoken":"cd09ae95-e2cf-4b8b-8929-791b0dd48cdd","experiment":"%2528not%2Bset%2529","medium":"referral","source":"www.google.com","ua":"chrome","variation":"%2528not%2Bset%2529"},"currentDate":"2024-10-30T20:46:19.747Z","profileAgeCreated":1696333826043,"usesFirefoxSync":false,"isFxAEnabled":true,"isFxASignedIn":false,"sync":{"desktopDevices":0,"mobileDevices":0,"totalDevices":0},"xpinstallEnabled":true,"addonsInfo":{"addons":{"formautofill@mozilla.org":{"version":"1.0.1","type":"extension","isSystem":true,"isWebExtension":true,"name":"Form Autofill","userDisabled":false,"installDate":"2023-09-28T01:41:23.000Z"},"pictureinpicture@mozilla.org":{"version":"1.0.0","type":"extension","isSystem":true,"isWebExtension":true,"name"
                                                                                                                                                                                                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                                                    Entropy (8bit):6.584665030956594
                                                                                                                                                                                                                                                    TrID:
                                                                                                                                                                                                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                                                                                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                                                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                                                                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                                                                                                    File name:file.exe
                                                                                                                                                                                                                                                    File size:919'552 bytes
                                                                                                                                                                                                                                                    MD5:c5c8202cf33c1c61d4463d53aa3748e5
                                                                                                                                                                                                                                                    SHA1:be46a2f36d213ed714a9f60f73e577d3884df9a4
                                                                                                                                                                                                                                                    SHA256:ca80960301e0e4d399cdd5f9b93395b0d398290e0978926d1620437e19e0e955
                                                                                                                                                                                                                                                    SHA512:df2a7b43d30369e15c516150e9070889e0d6d2dabe343caf2d189a406c10129a37c980e7c383b9c6d5ec17ae235dd88ac0fa1cb8f29f74175df504fe4e4377f0
                                                                                                                                                                                                                                                    SSDEEP:12288:GqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDga/TB:GqDEvCTbMWu7rQYlBQcBiT6rprG8abB
                                                                                                                                                                                                                                                    TLSH:E7159E0273D1C062FFAB92334B5AF6515BBC69260123E61F13981DB9BE701B1563E7A3
                                                                                                                                                                                                                                                    File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                                                                                                                                                                                                                    Icon Hash:aaf3e3e3938382a0
                                                                                                                                                                                                                                                    Entrypoint:0x420577
                                                                                                                                                                                                                                                    Entrypoint Section:.text
                                                                                                                                                                                                                                                    Digitally signed:false
                                                                                                                                                                                                                                                    Imagebase:0x400000
                                                                                                                                                                                                                                                    Subsystem:windows gui
                                                                                                                                                                                                                                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                                                                                                                                                                                    DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                                                                                                                                                                                                    Time Stamp:0x672288B2 [Wed Oct 30 19:27:46 2024 UTC]
                                                                                                                                                                                                                                                    TLS Callbacks:
                                                                                                                                                                                                                                                    CLR (.Net) Version:
                                                                                                                                                                                                                                                    OS Version Major:5
                                                                                                                                                                                                                                                    OS Version Minor:1
                                                                                                                                                                                                                                                    File Version Major:5
                                                                                                                                                                                                                                                    File Version Minor:1
                                                                                                                                                                                                                                                    Subsystem Version Major:5
                                                                                                                                                                                                                                                    Subsystem Version Minor:1
                                                                                                                                                                                                                                                    Import Hash:948cc502fe9226992dce9417f952fce3
                                                                                                                                                                                                                                                    Instruction
                                                                                                                                                                                                                                                    call 00007FD694CDCBC3h
                                                                                                                                                                                                                                                    jmp 00007FD694CDC4CFh
                                                                                                                                                                                                                                                    push ebp
                                                                                                                                                                                                                                                    mov ebp, esp
                                                                                                                                                                                                                                                    push esi
                                                                                                                                                                                                                                                    push dword ptr [ebp+08h]
                                                                                                                                                                                                                                                    mov esi, ecx
                                                                                                                                                                                                                                                    call 00007FD694CDC6ADh
                                                                                                                                                                                                                                                    mov dword ptr [esi], 0049FDF0h
                                                                                                                                                                                                                                                    mov eax, esi
                                                                                                                                                                                                                                                    pop esi
                                                                                                                                                                                                                                                    pop ebp
                                                                                                                                                                                                                                                    retn 0004h
                                                                                                                                                                                                                                                    and dword ptr [ecx+04h], 00000000h
                                                                                                                                                                                                                                                    mov eax, ecx
                                                                                                                                                                                                                                                    and dword ptr [ecx+08h], 00000000h
                                                                                                                                                                                                                                                    mov dword ptr [ecx+04h], 0049FDF8h
                                                                                                                                                                                                                                                    mov dword ptr [ecx], 0049FDF0h
                                                                                                                                                                                                                                                    ret
                                                                                                                                                                                                                                                    push ebp
                                                                                                                                                                                                                                                    mov ebp, esp
                                                                                                                                                                                                                                                    push esi
                                                                                                                                                                                                                                                    push dword ptr [ebp+08h]
                                                                                                                                                                                                                                                    mov esi, ecx
                                                                                                                                                                                                                                                    call 00007FD694CDC67Ah
                                                                                                                                                                                                                                                    mov dword ptr [esi], 0049FE0Ch
                                                                                                                                                                                                                                                    mov eax, esi
                                                                                                                                                                                                                                                    pop esi
                                                                                                                                                                                                                                                    pop ebp
                                                                                                                                                                                                                                                    retn 0004h
                                                                                                                                                                                                                                                    and dword ptr [ecx+04h], 00000000h
                                                                                                                                                                                                                                                    mov eax, ecx
                                                                                                                                                                                                                                                    and dword ptr [ecx+08h], 00000000h
                                                                                                                                                                                                                                                    mov dword ptr [ecx+04h], 0049FE14h
                                                                                                                                                                                                                                                    mov dword ptr [ecx], 0049FE0Ch
                                                                                                                                                                                                                                                    ret
                                                                                                                                                                                                                                                    push ebp
                                                                                                                                                                                                                                                    mov ebp, esp
                                                                                                                                                                                                                                                    push esi
                                                                                                                                                                                                                                                    mov esi, ecx
                                                                                                                                                                                                                                                    lea eax, dword ptr [esi+04h]
                                                                                                                                                                                                                                                    mov dword ptr [esi], 0049FDD0h
                                                                                                                                                                                                                                                    and dword ptr [eax], 00000000h
                                                                                                                                                                                                                                                    and dword ptr [eax+04h], 00000000h
                                                                                                                                                                                                                                                    push eax
                                                                                                                                                                                                                                                    mov eax, dword ptr [ebp+08h]
                                                                                                                                                                                                                                                    add eax, 04h
                                                                                                                                                                                                                                                    push eax
                                                                                                                                                                                                                                                    call 00007FD694CDF26Dh
                                                                                                                                                                                                                                                    pop ecx
                                                                                                                                                                                                                                                    pop ecx
                                                                                                                                                                                                                                                    mov eax, esi
                                                                                                                                                                                                                                                    pop esi
                                                                                                                                                                                                                                                    pop ebp
                                                                                                                                                                                                                                                    retn 0004h
                                                                                                                                                                                                                                                    lea eax, dword ptr [ecx+04h]
                                                                                                                                                                                                                                                    mov dword ptr [ecx], 0049FDD0h
                                                                                                                                                                                                                                                    push eax
                                                                                                                                                                                                                                                    call 00007FD694CDF2B8h
                                                                                                                                                                                                                                                    pop ecx
                                                                                                                                                                                                                                                    ret
                                                                                                                                                                                                                                                    push ebp
                                                                                                                                                                                                                                                    mov ebp, esp
                                                                                                                                                                                                                                                    push esi
                                                                                                                                                                                                                                                    mov esi, ecx
                                                                                                                                                                                                                                                    lea eax, dword ptr [esi+04h]
                                                                                                                                                                                                                                                    mov dword ptr [esi], 0049FDD0h
                                                                                                                                                                                                                                                    push eax
                                                                                                                                                                                                                                                    call 00007FD694CDF2A1h
                                                                                                                                                                                                                                                    test byte ptr [ebp+08h], 00000001h
                                                                                                                                                                                                                                                    pop ecx
                                                                                                                                                                                                                                                    Programming Language:
                                                                                                                                                                                                                                                    • [ C ] VS2008 SP1 build 30729
                                                                                                                                                                                                                                                    • [IMP] VS2008 SP1 build 30729
                                                                                                                                                                                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x9c28.rsrc
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xde0000x7594.reloc
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                                                                                                    .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                    .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                    .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                                                                    .rsrc0xd40000x9c280x9e00fbbe17f381a8bd61c9e01fe0de006257False0.3156398338607595data5.373960290861578IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                    .reloc0xde0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                                                                                                    RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                                                                                                                                                                                                    RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                                                                                                                                                                                                    RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                                                                                                                                                                                                    RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                                                                                                                                                                                                    RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                                                                                                                                                                                                    RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                                                                                                                                                                                                    RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                                                                                                                                                                                                    RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                                                                                                                                                                                                    RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                                                                                                                                                                                                    RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                                                                                                                                                                                                    RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                                                                                                                                                                                                    RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                                                                                                                                                                                                                    RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                                                                                                                                                                                                    RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                                                                                                                                                                                                                    RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                                                                                                                                                                                                                    RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                                                                                                                                                                                                    RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                                                                                                                                                                                                    RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                                                                                                                                                                                                    RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                                                                                                                                                                                                    RT_RCDATA0xdc7b80xef0data1.0028765690376569
                                                                                                                                                                                                                                                    RT_GROUP_ICON0xdd6a80x76dataEnglishGreat Britain0.6610169491525424
                                                                                                                                                                                                                                                    RT_GROUP_ICON0xdd7200x14dataEnglishGreat Britain1.25
                                                                                                                                                                                                                                                    RT_GROUP_ICON0xdd7340x14dataEnglishGreat Britain1.15
                                                                                                                                                                                                                                                    RT_GROUP_ICON0xdd7480x14dataEnglishGreat Britain1.25
                                                                                                                                                                                                                                                    RT_VERSION0xdd75c0xdcdataEnglishGreat Britain0.6181818181818182
                                                                                                                                                                                                                                                    RT_MANIFEST0xdd8380x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                                                                                                                                                                                                    DLLImport
                                                                                                                                                                                                                                                    WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                                                                                                                                                                                                                    VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                                                                                                                                                                                                    WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                                                                                                                                                                                                    COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                                                                                                                                                                                                    MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                                                                                                                                                                                                                    WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                                                                                                                                                                                                                    PSAPI.DLLGetProcessMemoryInfo
                                                                                                                                                                                                                                                    IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                                                                                                                                                                                                                    USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                                                                                                                                                                                                                    UxTheme.dllIsThemeActive
                                                                                                                                                                                                                                                    KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                                                                                                                                                                                                                    USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                                                                                                                                                                                                                    GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                                                                                                                                                                                                                    COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                                                                                                                                                                                                    ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                                                                                                                                                                                                                    SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                                                                                                                                                                                                                    ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                                                                                                                                                                                                                    OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                                                                                                                                                                                                                    Language of compilation systemCountry where language is spokenMap
                                                                                                                                                                                                                                                    EnglishGreat Britain
                                                                                                                                                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:03.671406984 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:03.671506882 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:03.671953917 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:03.678229094 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:03.678267002 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:04.290612936 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:04.295336008 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:04.297058105 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:04.305895090 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:04.305927992 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:04.306049109 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:04.306086063 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:04.306298018 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:04.306482077 CET49737443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:04.306524992 CET4434973735.190.72.216192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:04.306615114 CET49737443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:04.308106899 CET49737443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:04.308123112 CET4434973735.190.72.216192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:04.915625095 CET4434973735.190.72.216192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:04.915807009 CET49737443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:04.921257019 CET49737443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:04.921271086 CET4434973735.190.72.216192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:04.921344995 CET49737443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:04.921422005 CET4434973735.190.72.216192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:04.932020903 CET49737443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.618726969 CET49739443192.168.2.4172.217.23.110
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.618809938 CET44349739172.217.23.110192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.619226933 CET49739443192.168.2.4172.217.23.110
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.621109962 CET49739443192.168.2.4172.217.23.110
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.621160030 CET44349739172.217.23.110192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.825999975 CET49740443192.168.2.4172.217.23.110
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.826087952 CET44349740172.217.23.110192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.826649904 CET49740443192.168.2.4172.217.23.110
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.828105927 CET49740443192.168.2.4172.217.23.110
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.828140020 CET44349740172.217.23.110192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.848890066 CET4974180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.854299068 CET804974134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.854490995 CET4974180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.854609966 CET4974180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.859869003 CET804974134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.985733032 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.985771894 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.986319065 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.987795115 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.987811089 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.015062094 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.015079975 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.017266035 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.017406940 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.017448902 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.344558954 CET49744443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.344610929 CET4434974434.117.188.166192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.346590042 CET49744443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.347970009 CET49744443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.347997904 CET4434974434.117.188.166192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.451692104 CET804974134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.473901033 CET44349739172.217.23.110192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.474050999 CET49739443192.168.2.4172.217.23.110
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.474566936 CET44349739172.217.23.110192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.474627972 CET49739443192.168.2.4172.217.23.110
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.479424953 CET49739443192.168.2.4172.217.23.110
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.479446888 CET44349739172.217.23.110192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.479532003 CET49739443192.168.2.4172.217.23.110
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.479578018 CET44349739172.217.23.110192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.479649067 CET49739443192.168.2.4172.217.23.110
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.497397900 CET4974180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.505098104 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.505131006 CET4434974534.160.144.191192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.505222082 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.505398989 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.505413055 CET4434974534.160.144.191192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.592092037 CET4974680192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.596426010 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.596930027 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.597399950 CET804974634.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.597793102 CET4974680192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.599500895 CET4974680192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.602973938 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.602986097 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.603080034 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.603138924 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.603440046 CET49747443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.603480101 CET4434974734.117.188.166192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.604846954 CET804974634.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.607083082 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.607131958 CET49747443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.608603001 CET49747443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.608620882 CET4434974734.117.188.166192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.631196976 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.631264925 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.634144068 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.634149075 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.634638071 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.636965990 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.637034893 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.637339115 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.637403965 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.664355040 CET4974180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.670372009 CET804974134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.670439005 CET4974180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.685543060 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.690881968 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.693610907 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.693747044 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.699103117 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.705308914 CET44349740172.217.23.110192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.706012011 CET44349740172.217.23.110192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.711333036 CET44349740172.217.23.110192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.713694096 CET49740443192.168.2.4172.217.23.110
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.718159914 CET49740443192.168.2.4172.217.23.110
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.718179941 CET44349740172.217.23.110192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.718285084 CET49740443192.168.2.4172.217.23.110
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.718348980 CET44349740172.217.23.110192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.718607903 CET49749443192.168.2.4172.217.23.110
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.718631983 CET44349749172.217.23.110192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.718779087 CET49740443192.168.2.4172.217.23.110
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.718810081 CET49749443192.168.2.4172.217.23.110
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.720180035 CET49749443192.168.2.4172.217.23.110
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.720194101 CET44349749172.217.23.110192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.974955082 CET4434974434.117.188.166192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.975110054 CET49744443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.979757071 CET49744443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.979775906 CET4434974434.117.188.166192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.979891062 CET49744443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.980056047 CET4434974434.117.188.166192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.980282068 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.980314016 CET4434975134.117.188.166192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.980812073 CET49744443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.980830908 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.982189894 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.982204914 CET4434975134.117.188.166192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.127654076 CET4434974534.160.144.191192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.128535986 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.131731987 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.131746054 CET4434974534.160.144.191192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.131946087 CET4434974534.160.144.191192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.162839890 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.162961006 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.163012028 CET4434974534.160.144.191192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.163357019 CET49752443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.163402081 CET4434975234.160.144.191192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.168194056 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.168246031 CET49752443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.168461084 CET49752443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.168490887 CET4434975234.160.144.191192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.196190119 CET804974634.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.196619034 CET4974680192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.202244997 CET804974634.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.202321053 CET4974680192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.215650082 CET4434974734.117.188.166192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.215728998 CET49747443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.221039057 CET49747443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.221050024 CET4434974734.117.188.166192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.221117973 CET49747443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.221221924 CET4434974734.117.188.166192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.221343994 CET49747443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.292570114 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.346580029 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.493474960 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.494750977 CET49755443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.494769096 CET4434975534.107.243.93192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.498843908 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.500329971 CET49755443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.500329971 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.502062082 CET49755443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.502077103 CET4434975534.107.243.93192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.502202988 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.506843090 CET49756443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.506880999 CET4434975634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.507472038 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.511431932 CET49756443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.515464067 CET49756443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.515485048 CET4434975634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.564719915 CET44349749172.217.23.110192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.565426111 CET44349749172.217.23.110192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.569381952 CET49749443192.168.2.4172.217.23.110
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.569403887 CET44349749172.217.23.110192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.578583956 CET49749443192.168.2.4172.217.23.110
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.578608990 CET44349749172.217.23.110192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.578658104 CET49749443192.168.2.4172.217.23.110
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.578754902 CET44349749172.217.23.110192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.579269886 CET49749443192.168.2.4172.217.23.110
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.776971102 CET4434975234.160.144.191192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.786047935 CET49752443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.833450079 CET49752443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.833503008 CET4434975234.160.144.191192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.833844900 CET4434975234.160.144.191192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.835990906 CET49752443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.836066008 CET49752443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.836182117 CET4434975234.160.144.191192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.846612930 CET49752443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.846647978 CET49752443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.897826910 CET4434975134.117.188.166192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.903335094 CET4434975134.117.188.166192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.907200098 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.966633081 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.966648102 CET4434975134.117.188.166192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.966725111 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.967108011 CET4434975134.117.188.166192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.967669964 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.104281902 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.112138033 CET4434975534.107.243.93192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.112493038 CET49755443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.116910934 CET49755443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.116921902 CET4434975534.107.243.93192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.116986036 CET49755443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.117078066 CET4434975534.107.243.93192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.127501011 CET4434975634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.129235029 CET49755443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.129261017 CET49756443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.141974926 CET49756443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.141989946 CET4434975634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.142046928 CET49756443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.142237902 CET4434975634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.149389982 CET49756443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.149405003 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.203583002 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.204269886 CET49757443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.204308033 CET4434975734.149.100.209192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.206717968 CET49757443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.208163977 CET49757443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.208179951 CET4434975734.149.100.209192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.208899021 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.223172903 CET49758443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.223207951 CET4434975835.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.223742962 CET49758443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.223942041 CET49758443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.223953962 CET4434975835.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.328521967 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.371283054 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.449491978 CET49759443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.449526072 CET4434975934.117.188.166192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.452014923 CET49759443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.453632116 CET49759443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.453643084 CET4434975934.117.188.166192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.466671944 CET49760443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.466697931 CET4434976034.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.467514992 CET49760443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.468951941 CET49760443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.468966007 CET4434976034.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.838906050 CET4434975734.149.100.209192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.846868992 CET49757443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.864526033 CET4434975835.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.865448952 CET49758443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.924604893 CET49758443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.924619913 CET4434975835.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.924942970 CET4434975835.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.926732063 CET49757443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.926759958 CET4434975734.149.100.209192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.926814079 CET49757443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.926997900 CET4434975734.149.100.209192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.928164959 CET49757443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.929641962 CET49758443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.929713964 CET49758443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.929805994 CET4434975835.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.936774969 CET49758443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:09.068156958 CET4434976034.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:09.068236113 CET49760443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:09.070861101 CET4434975934.117.188.166192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:09.070935011 CET49759443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:09.105998039 CET49760443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:09.106014967 CET4434976034.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:09.106091976 CET49760443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:09.106193066 CET49759443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:09.106199980 CET4434975934.117.188.166192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:09.106211901 CET4434976034.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:09.106265068 CET49759443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:09.106374979 CET49760443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:09.106400013 CET4434975934.117.188.166192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:09.106447935 CET49759443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:10.838680029 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:10.844055891 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:10.888340950 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:10.889861107 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:10.889904022 CET4434976234.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:10.890156031 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:10.891719103 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:10.891738892 CET4434976234.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:10.893625975 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:10.966732979 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.004477978 CET49763443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.004580975 CET4434976334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.005759954 CET49764443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.005801916 CET4434976434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.007055044 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.007117987 CET49763443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.007250071 CET49764443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.007559061 CET49764443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.007569075 CET49763443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.007574081 CET4434976434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.007601976 CET4434976334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.013351917 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.060450077 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.510451078 CET4434976234.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.510539055 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.514328957 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.514339924 CET4434976234.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.514425039 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.514540911 CET4434976234.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.514763117 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.613826036 CET4434976434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.616657972 CET49764443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.619590044 CET49764443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.619599104 CET4434976434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.619862080 CET4434976434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.623883009 CET4434976334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.624130011 CET49763443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.626250029 CET49763443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.626269102 CET4434976334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.626503944 CET4434976334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.627087116 CET49764443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.627255917 CET4434976434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.627258062 CET49764443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.627264977 CET4434976434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.629324913 CET49763443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.629399061 CET49763443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.629487038 CET4434976334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.629539013 CET49763443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.835326910 CET4434976434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.835390091 CET49764443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.213392019 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.218765020 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.340090036 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.391869068 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:16.368742943 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:16.374346972 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:16.494013071 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:16.510611057 CET49769443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:16.510658979 CET4434976934.107.243.93192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:16.514461040 CET49769443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:16.516000986 CET49769443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:16.516019106 CET4434976934.107.243.93192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:16.548474073 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:17.137324095 CET4434976934.107.243.93192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:17.150383949 CET49769443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:17.163846016 CET49769443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:17.163872004 CET4434976934.107.243.93192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:17.163938046 CET49769443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:17.164012909 CET4434976934.107.243.93192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:17.165930986 CET49769443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:17.672456980 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:17.678025007 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:17.799793005 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:17.843328953 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:18.574721098 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:18.580061913 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:18.707412958 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:18.734363079 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:18.739725113 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:18.761620998 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:18.860865116 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:18.915242910 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:28.347227097 CET49772443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:28.347265959 CET4434977234.107.243.93192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:28.350467920 CET49772443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:28.351757050 CET49772443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:28.351767063 CET4434977234.107.243.93192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:28.721205950 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:28.726763010 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:28.874824047 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:28.880179882 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:28.954309940 CET4434977234.107.243.93192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:28.954583883 CET49772443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:28.959285021 CET49772443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:28.959294081 CET4434977234.107.243.93192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:28.959373951 CET49772443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:28.959435940 CET4434977234.107.243.93192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:28.960598946 CET49772443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:28.962866068 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:28.968267918 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:29.088347912 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:29.092117071 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:29.098192930 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:29.144424915 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:29.219724894 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:29.260338068 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.223463058 CET49773443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.223534107 CET4434977334.149.100.209192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.226401091 CET49773443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.226572990 CET49773443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.226591110 CET4434977334.149.100.209192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.230010033 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.230051041 CET4434977435.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.230680943 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.231339931 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.231350899 CET4434977435.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.231750011 CET49775443192.168.2.4151.101.193.91
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.231776953 CET44349775151.101.193.91192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.232594013 CET49775443192.168.2.4151.101.193.91
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.232680082 CET49775443192.168.2.4151.101.193.91
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.232695103 CET44349775151.101.193.91192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.256093979 CET49776443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.256113052 CET4434977635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.260304928 CET49776443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.261770010 CET49776443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.261780024 CET4434977635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.272250891 CET49777443192.168.2.435.201.103.21
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.272269011 CET4434977735.201.103.21192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.275629044 CET49777443192.168.2.435.201.103.21
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.277025938 CET49777443192.168.2.435.201.103.21
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.277043104 CET4434977735.201.103.21192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.835005999 CET4434977334.149.100.209192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.835120916 CET49773443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.838701010 CET49773443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.838712931 CET4434977334.149.100.209192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.838931084 CET4434977334.149.100.209192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.840013981 CET44349775151.101.193.91192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.840164900 CET49775443192.168.2.4151.101.193.91
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.842902899 CET49775443192.168.2.4151.101.193.91
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.842911005 CET44349775151.101.193.91192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.843146086 CET44349775151.101.193.91192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.844758034 CET49773443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.844885111 CET49773443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.844919920 CET4434977334.149.100.209192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.846319914 CET49775443192.168.2.4151.101.193.91
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.846395016 CET49775443192.168.2.4151.101.193.91
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.846482992 CET44349775151.101.193.91192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.848227978 CET49773443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.848236084 CET49775443192.168.2.4151.101.193.91
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.850745916 CET4434977435.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.850836992 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.853522062 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.853528976 CET4434977435.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.853615999 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.853744030 CET4434977435.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.856271029 CET49778443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.856348038 CET4434977835.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.857652903 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.857717037 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.857788086 CET4434977435.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.858397961 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.858591080 CET49778443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.858591080 CET49778443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.858680964 CET4434977835.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.859013081 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.860969067 CET49779443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.860997915 CET4434977935.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.861365080 CET49779443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.861485958 CET49779443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.861499071 CET4434977935.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.863255978 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.863356113 CET4434978035.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.863482952 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.863599062 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.863636017 CET4434978035.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.872256041 CET4434977635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.872339010 CET49776443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.876179934 CET49776443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.876188040 CET4434977635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.876249075 CET49776443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.876388073 CET4434977635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.885335922 CET49776443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.935148954 CET4434977735.201.103.21192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.935225964 CET49777443192.168.2.435.201.103.21
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.940203905 CET49777443192.168.2.435.201.103.21
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.940212011 CET4434977735.201.103.21192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.940299988 CET49777443192.168.2.435.201.103.21
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.940457106 CET4434977735.201.103.21192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.940809011 CET49777443192.168.2.435.201.103.21
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.952728987 CET49781443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.952826023 CET4434978134.149.100.209192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.953042984 CET49781443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.953135014 CET49781443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.953155041 CET4434978134.149.100.209192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.979167938 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.982172012 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.987696886 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.033682108 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.110732079 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.156120062 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.470675945 CET4434977935.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.470705032 CET4434977835.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.470777988 CET49779443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.471174002 CET49778443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.472773075 CET4434978035.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.473656893 CET49779443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.473664999 CET4434977935.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.473891020 CET4434977935.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.473911047 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.476243973 CET49778443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.476265907 CET4434977835.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.476511955 CET4434977835.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.478758097 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.478773117 CET4434978035.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.478984118 CET4434978035.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.482232094 CET49779443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.482320070 CET49779443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.482367039 CET4434977935.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.482897997 CET49778443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.482959986 CET49778443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.483077049 CET4434977835.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.483604908 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.483690977 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.483716965 CET4434978035.244.181.201192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.484745979 CET49779443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.484765053 CET49778443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.484774113 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.488487005 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.493817091 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.567576885 CET4434978134.149.100.209192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.567683935 CET49781443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.570542097 CET49781443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.570566893 CET4434978134.149.100.209192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.570914030 CET4434978134.149.100.209192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.572807074 CET49781443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.572927952 CET49781443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.573019028 CET4434978134.149.100.209192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.573757887 CET49781443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.613393068 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.616689920 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.622117996 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.657584906 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.743587017 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.789122105 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:43.617548943 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:43.622963905 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:43.749182940 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:43.755399942 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.113903046 CET49783443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.113919973 CET4434978334.107.243.93192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.114171982 CET49783443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.115668058 CET49783443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.115679026 CET4434978334.107.243.93192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.728570938 CET4434978334.107.243.93192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.728707075 CET49783443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.734030962 CET49783443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.734041929 CET4434978334.107.243.93192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.734071016 CET49783443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.734163046 CET4434978334.107.243.93192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.734716892 CET49783443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.736927032 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.744108915 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.861844063 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.864917040 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.870496988 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.904743910 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.992060900 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:50.036278963 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:59.872682095 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:59.877969027 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:59.995239973 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:00.001693964 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.357101917 CET49818443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.357125998 CET4434981834.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.357249975 CET49819443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.357275963 CET4434981934.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.357448101 CET49820443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.357470036 CET4434982034.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.357904911 CET49818443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.357912064 CET49820443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.357916117 CET49819443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.358109951 CET49818443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.358129025 CET4434981834.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.358268023 CET49820443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.358279943 CET4434982034.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.358367920 CET49819443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.358382940 CET4434981934.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.967921972 CET4434982034.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.968005896 CET49820443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.971311092 CET49820443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.971319914 CET4434982034.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.971565008 CET4434982034.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.973165989 CET4434981934.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.973366022 CET49819443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.976135969 CET49819443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.976145983 CET4434981934.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.976187944 CET49820443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.976341963 CET4434982034.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.976341963 CET4434981934.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.976576090 CET49820443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.976583958 CET4434982034.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.979562044 CET49819443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.979651928 CET49819443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.979685068 CET4434981934.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.981952906 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.982403040 CET49819443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.982430935 CET49819443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.982482910 CET49820443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.987457037 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.995732069 CET4434981834.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.995795012 CET49818443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.998644114 CET49818443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.998651981 CET4434981834.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.998886108 CET4434981834.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:03.001261950 CET49818443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:03.001365900 CET49818443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:03.001399994 CET4434981834.120.208.123192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:03.001519918 CET49818443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:03.107362986 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:03.139441967 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:03.146305084 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:03.152476072 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:03.267074108 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:03.312484980 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:08.026148081 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:08.031476021 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:08.151287079 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:08.154392958 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:08.159816980 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:08.210510969 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:08.282725096 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:08.342025042 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:18.154093981 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:18.159567118 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:18.301234961 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:18.306533098 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:28.173854113 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:28.179177046 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:28.327517986 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:28.332793951 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:30.566024065 CET49961443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:30.566054106 CET4434996134.107.243.93192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:30.566314936 CET49961443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:30.567773104 CET49961443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:30.567801952 CET4434996134.107.243.93192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:31.186014891 CET4434996134.107.243.93192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:31.191353083 CET4434996134.107.243.93192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:31.198286057 CET49961443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:31.202486038 CET49961443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:31.202495098 CET4434996134.107.243.93192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:31.202588081 CET49961443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:31.202985048 CET4434996134.107.243.93192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:31.205286980 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:31.205645084 CET49961443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:31.210664034 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:31.330332994 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:31.334687948 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:31.340116024 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:31.383223057 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:31.462025881 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:31.514739037 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:41.342561007 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:41.347893000 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:41.464925051 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:41.470362902 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:51.364455938 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:51.369863033 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:51.495997906 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:51.501813889 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:41:01.388974905 CET4974880192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:41:01.394399881 CET804974834.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:41:01.510072947 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                                    Oct 30, 2024 20:41:01.515463114 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:03.670980930 CET5261553192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:03.680211067 CET53526151.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:03.690179110 CET6224153192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:03.699278116 CET53622411.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.606626987 CET5296353192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.614562035 CET53529631.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.619056940 CET6234753192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.626945019 CET53623471.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.628129959 CET6397453192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.636816025 CET53639741.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.796844959 CET6470753192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.809134007 CET5178353192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.818330050 CET53517831.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.819025993 CET5141453192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.826653004 CET53514141.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.976838112 CET5658953192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.984935999 CET53565891.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.986241102 CET6024353192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.993868113 CET53602431.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.013012886 CET5024653192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.015336037 CET6405153192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.020246983 CET53502461.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.023762941 CET53640511.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.044138908 CET5643853192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.052555084 CET53564381.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.334306955 CET5452053192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.343151093 CET53545201.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.345155954 CET5724453192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.356163979 CET53572441.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.360507965 CET4971253192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.369134903 CET53497121.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.494859934 CET5396453192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.504112005 CET53539641.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.505669117 CET4994953192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.515202999 CET53499491.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.516350031 CET5074153192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.525082111 CET53507411.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.568697929 CET5669353192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.569777012 CET5212253192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.577599049 CET53566931.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.577614069 CET53521221.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.583281040 CET5199953192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.191359043 CET6228553192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.229084969 CET53518131.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.263870001 CET5682853192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.272516966 CET53568281.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.277647972 CET5314153192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.285026073 CET53531411.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.286740065 CET6202553192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.294908047 CET53620251.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.507386923 CET6061053192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.517818928 CET53606101.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.571696043 CET4925853192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.578855991 CET53492581.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.177409887 CET6321753192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.185046911 CET53632171.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.249541044 CET5756353192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.258052111 CET53575631.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.277746916 CET5028353192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.285306931 CET53502831.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:10.865366936 CET5649553192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:10.873986006 CET53564951.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:10.878099918 CET5483153192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:10.886370897 CET53548311.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:10.887608051 CET5890053192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:10.895194054 CET53589001.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.264431953 CET5225553192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.264818907 CET6154353192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.265036106 CET5323353192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.271958113 CET53615431.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.272464037 CET53522551.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.272824049 CET53532331.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.276000977 CET6229153192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.277044058 CET5273253192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.279546022 CET5709053192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.283373117 CET53622911.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.284178019 CET5219253192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.285069942 CET53527321.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.285928965 CET5601853192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.287736893 CET53570901.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.289933920 CET5723653192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.291701078 CET53521921.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.292293072 CET6241053192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.293689966 CET53560181.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.294778109 CET5118253192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.298118114 CET53572361.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.299941063 CET53624101.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.300581932 CET4948253192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.302915096 CET53511821.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.303366899 CET6006353192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.308067083 CET53494821.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.308563948 CET5356253192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.311249971 CET53600631.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.311645985 CET6455453192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.316138029 CET53535621.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.320048094 CET53645541.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:16.368674040 CET6094553192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:16.515052080 CET6490653192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:16.522342920 CET53649061.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:28.347665071 CET6259653192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:28.355540037 CET53625961.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.220794916 CET5891353192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.229424953 CET5468653192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.230114937 CET53589131.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.231962919 CET4931753192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.236881971 CET53546861.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.240099907 CET53493171.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.240631104 CET5743453192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.248274088 CET53574341.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.263056040 CET5439753192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.270684004 CET53543971.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.273197889 CET5500953192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.281137943 CET53550091.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.285254955 CET5933153192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.292726040 CET53593311.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.105604887 CET5841453192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.112965107 CET53584141.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.113600969 CET5077353192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.121465921 CET53507731.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.350028038 CET6506453192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.358475924 CET53650641.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:30.564852953 CET5252653192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:30.572890997 CET53525261.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:30.573985100 CET5718353192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:30.584032059 CET53571831.1.1.1192.168.2.4
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:31.205444098 CET5001753192.168.2.41.1.1.1
                                                                                                                                                                                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:03.670980930 CET192.168.2.41.1.1.10x40bcStandard query (0)prod.classify-client.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:03.690179110 CET192.168.2.41.1.1.10x4e62Standard query (0)prod.classify-client.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.606626987 CET192.168.2.41.1.1.10x114eStandard query (0)youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.619056940 CET192.168.2.41.1.1.10xc841Standard query (0)youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.628129959 CET192.168.2.41.1.1.10x2440Standard query (0)youtube.com28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.796844959 CET192.168.2.41.1.1.10xacd1Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.809134007 CET192.168.2.41.1.1.10xe2f1Standard query (0)prod.detectportal.prod.cloudops.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.819025993 CET192.168.2.41.1.1.10xcd86Standard query (0)prod.detectportal.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.976838112 CET192.168.2.41.1.1.10xbd3cStandard query (0)contile.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.986241102 CET192.168.2.41.1.1.10x7b80Standard query (0)contile.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.013012886 CET192.168.2.41.1.1.10x18aStandard query (0)contile.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.015336037 CET192.168.2.41.1.1.10xf59aStandard query (0)prod.balrog.prod.cloudops.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.044138908 CET192.168.2.41.1.1.10x6ac7Standard query (0)prod.balrog.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.334306955 CET192.168.2.41.1.1.10x812fStandard query (0)spocs.getpocket.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.345155954 CET192.168.2.41.1.1.10xc9e2Standard query (0)prod.ads.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.360507965 CET192.168.2.41.1.1.10x6c97Standard query (0)prod.ads.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.494859934 CET192.168.2.41.1.1.10x7753Standard query (0)content-signature-2.cdn.mozilla.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.505669117 CET192.168.2.41.1.1.10x16cfStandard query (0)prod.content-signature-chains.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.516350031 CET192.168.2.41.1.1.10xebd6Standard query (0)prod.content-signature-chains.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.568697929 CET192.168.2.41.1.1.10xc543Standard query (0)example.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.569777012 CET192.168.2.41.1.1.10x754bStandard query (0)ipv4only.arpaA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.583281040 CET192.168.2.41.1.1.10x5948Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.191359043 CET192.168.2.41.1.1.10xd4d9Standard query (0)shavar.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.263870001 CET192.168.2.41.1.1.10x7deStandard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.277647972 CET192.168.2.41.1.1.10xd414Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.286740065 CET192.168.2.41.1.1.10xf7d1Standard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.507386923 CET192.168.2.41.1.1.10x4bc4Standard query (0)telemetry-incoming.r53-2.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.571696043 CET192.168.2.41.1.1.10x6fcdStandard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.177409887 CET192.168.2.41.1.1.10x78f8Standard query (0)firefox.settings.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.249541044 CET192.168.2.41.1.1.10x589fStandard query (0)prod.remote-settings.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.277746916 CET192.168.2.41.1.1.10x6fb9Standard query (0)prod.remote-settings.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:10.865366936 CET192.168.2.41.1.1.10xd883Standard query (0)support.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:10.878099918 CET192.168.2.41.1.1.10xde33Standard query (0)us-west1.prod.sumo.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:10.887608051 CET192.168.2.41.1.1.10xab14Standard query (0)us-west1.prod.sumo.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.264431953 CET192.168.2.41.1.1.10x6934Standard query (0)www.youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.264818907 CET192.168.2.41.1.1.10xf99eStandard query (0)www.facebook.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.265036106 CET192.168.2.41.1.1.10x5083Standard query (0)www.wikipedia.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.276000977 CET192.168.2.41.1.1.10x5909Standard query (0)dyna.wikimedia.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.277044058 CET192.168.2.41.1.1.10x5af4Standard query (0)star-mini.c10r.facebook.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.279546022 CET192.168.2.41.1.1.10x13beStandard query (0)youtube-ui.l.google.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.284178019 CET192.168.2.41.1.1.10xb20dStandard query (0)dyna.wikimedia.org28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.285928965 CET192.168.2.41.1.1.10x36b9Standard query (0)star-mini.c10r.facebook.com28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.289933920 CET192.168.2.41.1.1.10xcaadStandard query (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.292293072 CET192.168.2.41.1.1.10xe875Standard query (0)www.reddit.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.294778109 CET192.168.2.41.1.1.10xc455Standard query (0)twitter.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.300581932 CET192.168.2.41.1.1.10x9fbcStandard query (0)reddit.map.fastly.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.303366899 CET192.168.2.41.1.1.10xbcf1Standard query (0)twitter.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.308563948 CET192.168.2.41.1.1.10x171fStandard query (0)reddit.map.fastly.net28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.311645985 CET192.168.2.41.1.1.10x74cdStandard query (0)twitter.com28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:16.368674040 CET192.168.2.41.1.1.10xae0aStandard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:16.515052080 CET192.168.2.41.1.1.10x977bStandard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:28.347665071 CET192.168.2.41.1.1.10xded6Standard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.220794916 CET192.168.2.41.1.1.10x26f1Standard query (0)services.addons.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.229424953 CET192.168.2.41.1.1.10xe6f6Standard query (0)prod.balrog.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.231962919 CET192.168.2.41.1.1.10x7c61Standard query (0)services.addons.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.240631104 CET192.168.2.41.1.1.10x9abStandard query (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.263056040 CET192.168.2.41.1.1.10xa5a6Standard query (0)normandy.cdn.mozilla.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.273197889 CET192.168.2.41.1.1.10x3d0fStandard query (0)normandy-cdn.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.285254955 CET192.168.2.41.1.1.10xafc2Standard query (0)normandy-cdn.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.105604887 CET192.168.2.41.1.1.10xc602Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.113600969 CET192.168.2.41.1.1.10xdfbaStandard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.350028038 CET192.168.2.41.1.1.10x1621Standard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:30.564852953 CET192.168.2.41.1.1.10x9b8eStandard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:30.573985100 CET192.168.2.41.1.1.10x4cffStandard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:31.205444098 CET192.168.2.41.1.1.10xae8eStandard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:03.652764082 CET1.1.1.1192.168.2.40xd2d7No error (0)prod.classify-client.prod.webservices.mozgcp.net35.190.72.216A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:03.680211067 CET1.1.1.1192.168.2.40x40bcNo error (0)prod.classify-client.prod.webservices.mozgcp.net35.190.72.216A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.614562035 CET1.1.1.1192.168.2.40x114eNo error (0)youtube.com172.217.23.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.626945019 CET1.1.1.1192.168.2.40xc841No error (0)youtube.com142.250.185.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.636816025 CET1.1.1.1192.168.2.40x2440No error (0)youtube.com28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.804029942 CET1.1.1.1192.168.2.40xacd1No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.804029942 CET1.1.1.1192.168.2.40xacd1No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.818330050 CET1.1.1.1192.168.2.40xe2f1No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.826653004 CET1.1.1.1192.168.2.40xcd86No error (0)prod.detectportal.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.984935999 CET1.1.1.1192.168.2.40xbd3cNo error (0)contile.services.mozilla.com34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.993868113 CET1.1.1.1192.168.2.40x7b80No error (0)contile.services.mozilla.com34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.013716936 CET1.1.1.1192.168.2.40xc586No error (0)balrog-aus5.r53-2.services.mozilla.comprod.balrog.prod.cloudops.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.013716936 CET1.1.1.1192.168.2.40xc586No error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.023762941 CET1.1.1.1192.168.2.40xf59aNo error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.343151093 CET1.1.1.1192.168.2.40x812fNo error (0)spocs.getpocket.comprod.ads.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.343151093 CET1.1.1.1192.168.2.40x812fNo error (0)prod.ads.prod.webservices.mozgcp.net34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.356163979 CET1.1.1.1192.168.2.40xc9e2No error (0)prod.ads.prod.webservices.mozgcp.net34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.504112005 CET1.1.1.1192.168.2.40x7753No error (0)content-signature-2.cdn.mozilla.netcontent-signature-chains.prod.autograph.services.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.504112005 CET1.1.1.1192.168.2.40x7753No error (0)content-signature-chains.prod.autograph.services.mozaws.netprod.content-signature-chains.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.504112005 CET1.1.1.1192.168.2.40x7753No error (0)prod.content-signature-chains.prod.webservices.mozgcp.net34.160.144.191A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.515202999 CET1.1.1.1192.168.2.40x16cfNo error (0)prod.content-signature-chains.prod.webservices.mozgcp.net34.160.144.191A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.525082111 CET1.1.1.1192.168.2.40xebd6No error (0)prod.content-signature-chains.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.577599049 CET1.1.1.1192.168.2.40xc543No error (0)example.org93.184.215.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.577614069 CET1.1.1.1192.168.2.40x754bNo error (0)ipv4only.arpa192.0.0.170A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.577614069 CET1.1.1.1192.168.2.40x754bNo error (0)ipv4only.arpa192.0.0.171A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.591428995 CET1.1.1.1192.168.2.40x5948No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.591428995 CET1.1.1.1192.168.2.40x5948No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.198920012 CET1.1.1.1192.168.2.40xd4d9No error (0)shavar.services.mozilla.comshavar.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.272516966 CET1.1.1.1192.168.2.40x7deNo error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.285026073 CET1.1.1.1192.168.2.40xd414No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.500725031 CET1.1.1.1192.168.2.40xbee5No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.517818928 CET1.1.1.1192.168.2.40x4bc4No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.183288097 CET1.1.1.1192.168.2.40xc578No error (0)balrog-aus5.r53-2.services.mozilla.comprod.balrog.prod.cloudops.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.183288097 CET1.1.1.1192.168.2.40xc578No error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.185046911 CET1.1.1.1192.168.2.40x78f8No error (0)firefox.settings.services.mozilla.comprod.remote-settings.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.185046911 CET1.1.1.1192.168.2.40x78f8No error (0)prod.remote-settings.prod.webservices.mozgcp.net34.149.100.209A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.258052111 CET1.1.1.1192.168.2.40x589fNo error (0)prod.remote-settings.prod.webservices.mozgcp.net34.149.100.209A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.457750082 CET1.1.1.1192.168.2.40xd97No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:10.873986006 CET1.1.1.1192.168.2.40xd883No error (0)support.mozilla.orgprod.sumo.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:10.873986006 CET1.1.1.1192.168.2.40xd883No error (0)prod.sumo.prod.webservices.mozgcp.netus-west1.prod.sumo.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:10.873986006 CET1.1.1.1192.168.2.40xd883No error (0)us-west1.prod.sumo.prod.webservices.mozgcp.net34.149.128.2A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:10.886370897 CET1.1.1.1192.168.2.40xde33No error (0)us-west1.prod.sumo.prod.webservices.mozgcp.net34.149.128.2A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.271958113 CET1.1.1.1192.168.2.40xf99eNo error (0)www.facebook.comstar-mini.c10r.facebook.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.271958113 CET1.1.1.1192.168.2.40xf99eNo error (0)star-mini.c10r.facebook.com157.240.0.35A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.272464037 CET1.1.1.1192.168.2.40x6934No error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.272464037 CET1.1.1.1192.168.2.40x6934No error (0)youtube-ui.l.google.com142.250.185.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.272464037 CET1.1.1.1192.168.2.40x6934No error (0)youtube-ui.l.google.com142.250.185.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.272464037 CET1.1.1.1192.168.2.40x6934No error (0)youtube-ui.l.google.com172.217.18.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.272464037 CET1.1.1.1192.168.2.40x6934No error (0)youtube-ui.l.google.com142.250.186.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.272464037 CET1.1.1.1192.168.2.40x6934No error (0)youtube-ui.l.google.com142.250.186.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.272464037 CET1.1.1.1192.168.2.40x6934No error (0)youtube-ui.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.272464037 CET1.1.1.1192.168.2.40x6934No error (0)youtube-ui.l.google.com142.250.184.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.272464037 CET1.1.1.1192.168.2.40x6934No error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.272464037 CET1.1.1.1192.168.2.40x6934No error (0)youtube-ui.l.google.com172.217.23.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.272464037 CET1.1.1.1192.168.2.40x6934No error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.272464037 CET1.1.1.1192.168.2.40x6934No error (0)youtube-ui.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.272464037 CET1.1.1.1192.168.2.40x6934No error (0)youtube-ui.l.google.com142.250.185.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.272464037 CET1.1.1.1192.168.2.40x6934No error (0)youtube-ui.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.272464037 CET1.1.1.1192.168.2.40x6934No error (0)youtube-ui.l.google.com172.217.18.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.272464037 CET1.1.1.1192.168.2.40x6934No error (0)youtube-ui.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.272464037 CET1.1.1.1192.168.2.40x6934No error (0)youtube-ui.l.google.com216.58.206.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.272824049 CET1.1.1.1192.168.2.40x5083No error (0)www.wikipedia.orgdyna.wikimedia.orgCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.272824049 CET1.1.1.1192.168.2.40x5083No error (0)dyna.wikimedia.org185.15.59.224A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.283373117 CET1.1.1.1192.168.2.40x5909No error (0)dyna.wikimedia.org185.15.59.224A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.285069942 CET1.1.1.1192.168.2.40x5af4No error (0)star-mini.c10r.facebook.com157.240.0.35A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.287736893 CET1.1.1.1192.168.2.40x13beNo error (0)youtube-ui.l.google.com216.58.212.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.287736893 CET1.1.1.1192.168.2.40x13beNo error (0)youtube-ui.l.google.com142.250.186.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.287736893 CET1.1.1.1192.168.2.40x13beNo error (0)youtube-ui.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.287736893 CET1.1.1.1192.168.2.40x13beNo error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.287736893 CET1.1.1.1192.168.2.40x13beNo error (0)youtube-ui.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.287736893 CET1.1.1.1192.168.2.40x13beNo error (0)youtube-ui.l.google.com142.250.185.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.287736893 CET1.1.1.1192.168.2.40x13beNo error (0)youtube-ui.l.google.com142.250.185.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.287736893 CET1.1.1.1192.168.2.40x13beNo error (0)youtube-ui.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.287736893 CET1.1.1.1192.168.2.40x13beNo error (0)youtube-ui.l.google.com172.217.16.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.287736893 CET1.1.1.1192.168.2.40x13beNo error (0)youtube-ui.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.287736893 CET1.1.1.1192.168.2.40x13beNo error (0)youtube-ui.l.google.com216.58.206.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.287736893 CET1.1.1.1192.168.2.40x13beNo error (0)youtube-ui.l.google.com142.250.186.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.287736893 CET1.1.1.1192.168.2.40x13beNo error (0)youtube-ui.l.google.com142.250.185.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.287736893 CET1.1.1.1192.168.2.40x13beNo error (0)youtube-ui.l.google.com216.58.206.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.287736893 CET1.1.1.1192.168.2.40x13beNo error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.287736893 CET1.1.1.1192.168.2.40x13beNo error (0)youtube-ui.l.google.com142.250.181.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.291701078 CET1.1.1.1192.168.2.40xb20dNo error (0)dyna.wikimedia.org28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.293689966 CET1.1.1.1192.168.2.40x36b9No error (0)star-mini.c10r.facebook.com28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.298118114 CET1.1.1.1192.168.2.40xcaadNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.298118114 CET1.1.1.1192.168.2.40xcaadNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.298118114 CET1.1.1.1192.168.2.40xcaadNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.298118114 CET1.1.1.1192.168.2.40xcaadNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.299941063 CET1.1.1.1192.168.2.40xe875No error (0)www.reddit.comreddit.map.fastly.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.299941063 CET1.1.1.1192.168.2.40xe875No error (0)reddit.map.fastly.net151.101.1.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.299941063 CET1.1.1.1192.168.2.40xe875No error (0)reddit.map.fastly.net151.101.193.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.299941063 CET1.1.1.1192.168.2.40xe875No error (0)reddit.map.fastly.net151.101.129.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.299941063 CET1.1.1.1192.168.2.40xe875No error (0)reddit.map.fastly.net151.101.65.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.302915096 CET1.1.1.1192.168.2.40xc455No error (0)twitter.com104.244.42.129A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.308067083 CET1.1.1.1192.168.2.40x9fbcNo error (0)reddit.map.fastly.net151.101.193.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.308067083 CET1.1.1.1192.168.2.40x9fbcNo error (0)reddit.map.fastly.net151.101.65.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.308067083 CET1.1.1.1192.168.2.40x9fbcNo error (0)reddit.map.fastly.net151.101.129.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.308067083 CET1.1.1.1192.168.2.40x9fbcNo error (0)reddit.map.fastly.net151.101.1.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.311249971 CET1.1.1.1192.168.2.40xbcf1No error (0)twitter.com104.244.42.193A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:16.376595020 CET1.1.1.1192.168.2.40xae0aNo error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:16.376595020 CET1.1.1.1192.168.2.40xae0aNo error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.227932930 CET1.1.1.1192.168.2.40x2b66No error (0)balrog-aus5.r53-2.services.mozilla.comprod.balrog.prod.cloudops.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.227932930 CET1.1.1.1192.168.2.40x2b66No error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.230114937 CET1.1.1.1192.168.2.40x26f1No error (0)services.addons.mozilla.org151.101.193.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.230114937 CET1.1.1.1192.168.2.40x26f1No error (0)services.addons.mozilla.org151.101.65.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.230114937 CET1.1.1.1192.168.2.40x26f1No error (0)services.addons.mozilla.org151.101.1.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.230114937 CET1.1.1.1192.168.2.40x26f1No error (0)services.addons.mozilla.org151.101.129.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.240099907 CET1.1.1.1192.168.2.40x7c61No error (0)services.addons.mozilla.org151.101.1.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.240099907 CET1.1.1.1192.168.2.40x7c61No error (0)services.addons.mozilla.org151.101.65.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.240099907 CET1.1.1.1192.168.2.40x7c61No error (0)services.addons.mozilla.org151.101.193.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.240099907 CET1.1.1.1192.168.2.40x7c61No error (0)services.addons.mozilla.org151.101.129.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.248274088 CET1.1.1.1192.168.2.40x9abNo error (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.248274088 CET1.1.1.1192.168.2.40x9abNo error (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.248274088 CET1.1.1.1192.168.2.40x9abNo error (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.248274088 CET1.1.1.1192.168.2.40x9abNo error (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.270684004 CET1.1.1.1192.168.2.40xa5a6No error (0)normandy.cdn.mozilla.netnormandy-cdn.services.mozilla.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.270684004 CET1.1.1.1192.168.2.40xa5a6No error (0)normandy-cdn.services.mozilla.com35.201.103.21A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.281137943 CET1.1.1.1192.168.2.40x3d0fNo error (0)normandy-cdn.services.mozilla.com35.201.103.21A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.501602888 CET1.1.1.1192.168.2.40xebNo error (0)a21ed24aedde648804e7-228765c84088fef4ff5e70f2710398e9.r17.cf1.rackcdn.coma17.rackcdn.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.501602888 CET1.1.1.1192.168.2.40xebNo error (0)a17.rackcdn.coma17.rackcdn.com.mdc.edgesuite.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.112965107 CET1.1.1.1192.168.2.40xc602No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.347716093 CET1.1.1.1192.168.2.40x83dNo error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:30.572890997 CET1.1.1.1192.168.2.40x9b8eNo error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:31.213134050 CET1.1.1.1192.168.2.40xae8eNo error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:31.213134050 CET1.1.1.1192.168.2.40xae8eNo error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    • detectportal.firefox.com
                                                                                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                    0192.168.2.44974134.107.221.82807776C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:05.854609966 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.451692104 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                    Content-Length: 90
                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                    Date: Wed, 30 Oct 2024 04:31:13 GMT
                                                                                                                                                                                                                                                    Age: 54473
                                                                                                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                    Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                    Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>


                                                                                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                    1192.168.2.44974634.107.221.82807776C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.599500895 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.196190119 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                    Date: Wed, 30 Oct 2024 04:30:51 GMT
                                                                                                                                                                                                                                                    Age: 54496
                                                                                                                                                                                                                                                    Content-Type: text/plain
                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                    Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                    Data Ascii: success


                                                                                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                    2192.168.2.44974834.107.221.82807776C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:06.693747044 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.292570114 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                    Content-Length: 90
                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                    Date: Wed, 30 Oct 2024 04:31:13 GMT
                                                                                                                                                                                                                                                    Age: 54474
                                                                                                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                    Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                    Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.203583002 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.328521967 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                    Content-Length: 90
                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                    Date: Wed, 30 Oct 2024 04:31:13 GMT
                                                                                                                                                                                                                                                    Age: 54475
                                                                                                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                    Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                    Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:10.888340950 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:11.013351917 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                    Content-Length: 90
                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                    Date: Wed, 30 Oct 2024 04:31:13 GMT
                                                                                                                                                                                                                                                    Age: 54477
                                                                                                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                    Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                    Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:16.368742943 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:16.494013071 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                    Content-Length: 90
                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                    Date: Wed, 30 Oct 2024 04:31:13 GMT
                                                                                                                                                                                                                                                    Age: 54483
                                                                                                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                    Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                    Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:18.574721098 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:18.707412958 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                    Content-Length: 90
                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                    Date: Wed, 30 Oct 2024 04:31:13 GMT
                                                                                                                                                                                                                                                    Age: 54485
                                                                                                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                    Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                    Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:28.721205950 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:28.962866068 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:29.088347912 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                    Content-Length: 90
                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                    Date: Wed, 30 Oct 2024 04:31:13 GMT
                                                                                                                                                                                                                                                    Age: 54496
                                                                                                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                    Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                    Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.853615999 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.979167938 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                    Content-Length: 90
                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                    Date: Wed, 30 Oct 2024 04:31:13 GMT
                                                                                                                                                                                                                                                    Age: 54499
                                                                                                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                    Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                    Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.488487005 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.613393068 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                    Content-Length: 90
                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                    Date: Wed, 30 Oct 2024 04:31:13 GMT
                                                                                                                                                                                                                                                    Age: 54500
                                                                                                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                    Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                    Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:43.617548943 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.736927032 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.861844063 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                    Content-Length: 90
                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                    Date: Wed, 30 Oct 2024 04:31:13 GMT
                                                                                                                                                                                                                                                    Age: 54516
                                                                                                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                    Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                    Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:59.872682095 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:02.981952906 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:03.107362986 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                    Content-Length: 90
                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                    Date: Wed, 30 Oct 2024 04:31:13 GMT
                                                                                                                                                                                                                                                    Age: 54530
                                                                                                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                    Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                    Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:08.026148081 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:08.151287079 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                    Content-Length: 90
                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                    Date: Wed, 30 Oct 2024 04:31:13 GMT
                                                                                                                                                                                                                                                    Age: 54535
                                                                                                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                    Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                    Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:18.154093981 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:28.173854113 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:31.205286980 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:31.330332994 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                    Content-Length: 90
                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                    Date: Wed, 30 Oct 2024 04:31:13 GMT
                                                                                                                                                                                                                                                    Age: 54558
                                                                                                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                    Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                    Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:41.342561007 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:51.364455938 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                    Oct 30, 2024 20:41:01.388974905 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                    Data Ascii:


                                                                                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                    3192.168.2.44975434.107.221.82807776C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:07.502202988 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:08.104281902 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                    Date: Wed, 30 Oct 2024 04:30:51 GMT
                                                                                                                                                                                                                                                    Age: 54497
                                                                                                                                                                                                                                                    Content-Type: text/plain
                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                    Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                    Data Ascii: success
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:10.838680029 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:10.966732979 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                    Date: Wed, 30 Oct 2024 04:30:51 GMT
                                                                                                                                                                                                                                                    Age: 54499
                                                                                                                                                                                                                                                    Content-Type: text/plain
                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                    Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                    Data Ascii: success
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.213392019 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:15.340090036 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                    Date: Wed, 30 Oct 2024 04:30:51 GMT
                                                                                                                                                                                                                                                    Age: 54504
                                                                                                                                                                                                                                                    Content-Type: text/plain
                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                    Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                    Data Ascii: success
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:17.672456980 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:17.799793005 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                    Date: Wed, 30 Oct 2024 04:30:51 GMT
                                                                                                                                                                                                                                                    Age: 54506
                                                                                                                                                                                                                                                    Content-Type: text/plain
                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                    Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                    Data Ascii: success
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:18.734363079 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:18.860865116 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                    Date: Wed, 30 Oct 2024 04:30:51 GMT
                                                                                                                                                                                                                                                    Age: 54507
                                                                                                                                                                                                                                                    Content-Type: text/plain
                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                    Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                    Data Ascii: success
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:28.874824047 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:29.092117071 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:29.219724894 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                    Date: Wed, 30 Oct 2024 04:30:51 GMT
                                                                                                                                                                                                                                                    Age: 54518
                                                                                                                                                                                                                                                    Content-Type: text/plain
                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                    Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                    Data Ascii: success
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:32.982172012 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.110732079 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                    Date: Wed, 30 Oct 2024 04:30:51 GMT
                                                                                                                                                                                                                                                    Age: 54522
                                                                                                                                                                                                                                                    Content-Type: text/plain
                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                    Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                    Data Ascii: success
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.616689920 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:33.743587017 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                    Date: Wed, 30 Oct 2024 04:30:51 GMT
                                                                                                                                                                                                                                                    Age: 54522
                                                                                                                                                                                                                                                    Content-Type: text/plain
                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                    Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                    Data Ascii: success
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:43.749182940 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.864917040 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:49.992060900 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                    Date: Wed, 30 Oct 2024 04:30:51 GMT
                                                                                                                                                                                                                                                    Age: 54538
                                                                                                                                                                                                                                                    Content-Type: text/plain
                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                    Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                    Data Ascii: success
                                                                                                                                                                                                                                                    Oct 30, 2024 20:39:59.995239973 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:03.139441967 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:03.267074108 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                    Date: Wed, 30 Oct 2024 04:30:51 GMT
                                                                                                                                                                                                                                                    Age: 54552
                                                                                                                                                                                                                                                    Content-Type: text/plain
                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                    Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                    Data Ascii: success
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:08.154392958 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:08.282725096 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                    Date: Wed, 30 Oct 2024 04:30:51 GMT
                                                                                                                                                                                                                                                    Age: 54557
                                                                                                                                                                                                                                                    Content-Type: text/plain
                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                    Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                    Data Ascii: success
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:18.301234961 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:28.327517986 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:31.334687948 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:31.462025881 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                    Date: Wed, 30 Oct 2024 04:30:51 GMT
                                                                                                                                                                                                                                                    Age: 54580
                                                                                                                                                                                                                                                    Content-Type: text/plain
                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                    Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                    Data Ascii: success
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:41.464925051 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                    Oct 30, 2024 20:40:51.495997906 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                    Oct 30, 2024 20:41:01.510072947 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                    Data Ascii:


                                                                                                                                                                                                                                                    Click to jump to process

                                                                                                                                                                                                                                                    Click to jump to process

                                                                                                                                                                                                                                                    Click to dive into process behavior distribution

                                                                                                                                                                                                                                                    Click to jump to process

                                                                                                                                                                                                                                                    Target ID:0
                                                                                                                                                                                                                                                    Start time:15:38:56
                                                                                                                                                                                                                                                    Start date:30/10/2024
                                                                                                                                                                                                                                                    Path:C:\Users\user\Desktop\file.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Users\user\Desktop\file.exe"
                                                                                                                                                                                                                                                    Imagebase:0x6b0000
                                                                                                                                                                                                                                                    File size:919'552 bytes
                                                                                                                                                                                                                                                    MD5 hash:C5C8202CF33C1C61D4463D53AA3748E5
                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Reputation:low
                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                    Target ID:1
                                                                                                                                                                                                                                                    Start time:15:38:56
                                                                                                                                                                                                                                                    Start date:30/10/2024
                                                                                                                                                                                                                                                    Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:taskkill /F /IM firefox.exe /T
                                                                                                                                                                                                                                                    Imagebase:0x3e0000
                                                                                                                                                                                                                                                    File size:74'240 bytes
                                                                                                                                                                                                                                                    MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                    Target ID:2
                                                                                                                                                                                                                                                    Start time:15:38:56
                                                                                                                                                                                                                                                    Start date:30/10/2024
                                                                                                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                    Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                    Target ID:3
                                                                                                                                                                                                                                                    Start time:15:38:58
                                                                                                                                                                                                                                                    Start date:30/10/2024
                                                                                                                                                                                                                                                    Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:taskkill /F /IM chrome.exe /T
                                                                                                                                                                                                                                                    Imagebase:0x3e0000
                                                                                                                                                                                                                                                    File size:74'240 bytes
                                                                                                                                                                                                                                                    MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                    Target ID:4
                                                                                                                                                                                                                                                    Start time:15:38:58
                                                                                                                                                                                                                                                    Start date:30/10/2024
                                                                                                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                    Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                    Target ID:5
                                                                                                                                                                                                                                                    Start time:15:38:59
                                                                                                                                                                                                                                                    Start date:30/10/2024
                                                                                                                                                                                                                                                    Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:taskkill /F /IM msedge.exe /T
                                                                                                                                                                                                                                                    Imagebase:0x3e0000
                                                                                                                                                                                                                                                    File size:74'240 bytes
                                                                                                                                                                                                                                                    MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                    Target ID:6
                                                                                                                                                                                                                                                    Start time:15:38:59
                                                                                                                                                                                                                                                    Start date:30/10/2024
                                                                                                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                    Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                    Target ID:7
                                                                                                                                                                                                                                                    Start time:15:38:59
                                                                                                                                                                                                                                                    Start date:30/10/2024
                                                                                                                                                                                                                                                    Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:taskkill /F /IM opera.exe /T
                                                                                                                                                                                                                                                    Imagebase:0x3e0000
                                                                                                                                                                                                                                                    File size:74'240 bytes
                                                                                                                                                                                                                                                    MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                    Target ID:8
                                                                                                                                                                                                                                                    Start time:15:38:59
                                                                                                                                                                                                                                                    Start date:30/10/2024
                                                                                                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                    Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                    Target ID:9
                                                                                                                                                                                                                                                    Start time:15:38:59
                                                                                                                                                                                                                                                    Start date:30/10/2024
                                                                                                                                                                                                                                                    Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:taskkill /F /IM brave.exe /T
                                                                                                                                                                                                                                                    Imagebase:0x3e0000
                                                                                                                                                                                                                                                    File size:74'240 bytes
                                                                                                                                                                                                                                                    MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                    Target ID:10
                                                                                                                                                                                                                                                    Start time:15:38:59
                                                                                                                                                                                                                                                    Start date:30/10/2024
                                                                                                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                    Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                    Target ID:11
                                                                                                                                                                                                                                                    Start time:15:38:59
                                                                                                                                                                                                                                                    Start date:30/10/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                                                                                                    Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                                    File size:676'768 bytes
                                                                                                                                                                                                                                                    MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                    Target ID:12
                                                                                                                                                                                                                                                    Start time:15:38:59
                                                                                                                                                                                                                                                    Start date:30/10/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
                                                                                                                                                                                                                                                    Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                                    File size:676'768 bytes
                                                                                                                                                                                                                                                    MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                    Target ID:13
                                                                                                                                                                                                                                                    Start time:15:38:59
                                                                                                                                                                                                                                                    Start date:30/10/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                                                                                                    Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                                    File size:676'768 bytes
                                                                                                                                                                                                                                                    MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:15
                                                                                                                                                                                                                                                    Start time:15:39:00
                                                                                                                                                                                                                                                    Start date:30/10/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2276 -parentBuildID 20230927232528 -prefsHandle 2216 -prefMapHandle 2208 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a46847d0-9293-4bac-8415-4fa2947c8e97} 7776 "\\.\pipe\gecko-crash-server-pipe.7776" 1ccdad6d510 socket
                                                                                                                                                                                                                                                    Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                                    File size:676'768 bytes
                                                                                                                                                                                                                                                    MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:16
                                                                                                                                                                                                                                                    Start time:15:39:02
                                                                                                                                                                                                                                                    Start date:30/10/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2696 -parentBuildID 20230927232528 -prefsHandle 4228 -prefMapHandle 4224 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7cff00d-f0b1-495f-9d3f-92f956d45c2c} 7776 "\\.\pipe\gecko-crash-server-pipe.7776" 1ccece2fb10 rdd
                                                                                                                                                                                                                                                    Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                                    File size:676'768 bytes
                                                                                                                                                                                                                                                    MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Target ID:17
                                                                                                                                                                                                                                                    Start time:15:39:06
                                                                                                                                                                                                                                                    Start date:30/10/2024
                                                                                                                                                                                                                                                    Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                    Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4952 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4956 -prefMapHandle 4904 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ff0ebe7f-fa1c-41ff-ae44-07a5d0ab7bae} 7776 "\\.\pipe\gecko-crash-server-pipe.7776" 1ccec341110 utility
                                                                                                                                                                                                                                                    Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                                    File size:676'768 bytes
                                                                                                                                                                                                                                                    MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                    Reset < >

                                                                                                                                                                                                                                                      Execution Graph

                                                                                                                                                                                                                                                      Execution Coverage:2.1%
                                                                                                                                                                                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                                                                      Signature Coverage:6.4%
                                                                                                                                                                                                                                                      Total number of Nodes:1602
                                                                                                                                                                                                                                                      Total number of Limit Nodes:80
                                                                                                                                                                                                                                                      execution_graph 93849 742a55 93857 721ebc 93849->93857 93852 742a70 93859 7139c0 22 API calls 93852->93859 93853 742a87 93855 742a7c 93860 71417d 22 API calls __fread_nolock 93855->93860 93858 721ec3 IsWindow 93857->93858 93858->93852 93858->93853 93859->93855 93860->93853 93861 703f75 93872 6cceb1 93861->93872 93863 703f8b 93864 704006 93863->93864 93939 6ce300 23 API calls 93863->93939 93881 6bbf40 93864->93881 93868 703fe6 93870 704052 93868->93870 93940 721abf 22 API calls 93868->93940 93869 704a88 93870->93869 93941 72359c 82 API calls __wsopen_s 93870->93941 93873 6ccebf 93872->93873 93874 6cced2 93872->93874 93942 6baceb 93873->93942 93876 6ccf05 93874->93876 93877 6cced7 93874->93877 93878 6baceb 23 API calls 93876->93878 93952 6cfddb 93877->93952 93880 6ccec9 93878->93880 93880->93863 93976 6badf0 93881->93976 93883 6bbf9d 93884 6bbfa9 93883->93884 93885 7004b6 93883->93885 93887 6bc01e 93884->93887 93888 7004c6 93884->93888 94004 72359c 82 API calls __wsopen_s 93885->94004 93981 6bac91 93887->93981 94005 72359c 82 API calls __wsopen_s 93888->94005 93891 7004f5 93892 70055a 93891->93892 94006 6cd217 348 API calls 93891->94006 93922 6bc603 93892->93922 94007 72359c 82 API calls __wsopen_s 93892->94007 93894 6bc7da 93993 6cfe0b 93894->93993 93901 6bec40 348 API calls 93936 6bc039 ISource __fread_nolock 93901->93936 93902 6cfe0b 22 API calls 93935 6bc350 ISource __fread_nolock 93902->93935 93903 6baf8a 22 API calls 93903->93936 93904 717120 22 API calls 93904->93936 93905 6bc808 __fread_nolock 93905->93902 93906 70091a 94040 723209 23 API calls 93906->94040 93909 7008a5 94014 6bec40 93909->94014 93911 7008cf 93911->93922 94038 6ba81b 41 API calls 93911->94038 93913 700591 94008 72359c 82 API calls __wsopen_s 93913->94008 93914 7008f6 94039 72359c 82 API calls __wsopen_s 93914->94039 93919 6baceb 23 API calls 93919->93936 93920 6bc237 93921 6bc253 93920->93921 94041 6ba8c7 22 API calls __fread_nolock 93920->94041 93924 700976 93921->93924 93928 6bc297 ISource 93921->93928 93922->93870 93927 6baceb 23 API calls 93924->93927 93926 6cfddb 22 API calls 93926->93936 93931 7009bf 93927->93931 93929 6baceb 23 API calls 93928->93929 93928->93931 93930 6bc335 93929->93930 93930->93931 93932 6bc342 93930->93932 93931->93922 94042 72359c 82 API calls __wsopen_s 93931->94042 93992 6ba704 22 API calls ISource 93932->93992 93933 6bbbe0 40 API calls 93933->93936 93938 6bc3ac 93935->93938 94003 6cce17 22 API calls ISource 93935->94003 93936->93891 93936->93892 93936->93894 93936->93901 93936->93903 93936->93904 93936->93905 93936->93906 93936->93909 93936->93913 93936->93914 93936->93919 93936->93920 93936->93922 93936->93926 93936->93931 93936->93933 93937 6cfe0b 22 API calls 93936->93937 93985 6bad81 93936->93985 94009 717099 22 API calls __fread_nolock 93936->94009 94010 735745 54 API calls _wcslen 93936->94010 94011 6caa42 22 API calls ISource 93936->94011 94012 71f05c 40 API calls 93936->94012 94013 6ba993 41 API calls 93936->94013 93937->93936 93938->93870 93939->93868 93940->93864 93941->93869 93943 6bacf9 93942->93943 93951 6bad2a ISource 93942->93951 93944 6bad55 93943->93944 93946 6bad01 ISource 93943->93946 93944->93951 93962 6ba8c7 22 API calls __fread_nolock 93944->93962 93947 6ffa48 93946->93947 93948 6bad21 93946->93948 93946->93951 93947->93951 93963 6cce17 22 API calls ISource 93947->93963 93949 6ffa3a VariantClear 93948->93949 93948->93951 93949->93951 93951->93880 93955 6cfde0 93952->93955 93954 6cfdfa 93954->93880 93955->93954 93957 6cfdfc 93955->93957 93964 6dea0c 93955->93964 93971 6d4ead 7 API calls 2 library calls 93955->93971 93958 6d066d 93957->93958 93972 6d32a4 RaiseException 93957->93972 93973 6d32a4 RaiseException 93958->93973 93961 6d068a 93961->93880 93962->93951 93963->93951 93969 6e3820 __dosmaperr 93964->93969 93965 6e385e 93975 6df2d9 20 API calls __dosmaperr 93965->93975 93966 6e3849 RtlAllocateHeap 93968 6e385c 93966->93968 93966->93969 93968->93955 93969->93965 93969->93966 93974 6d4ead 7 API calls 2 library calls 93969->93974 93971->93955 93972->93958 93973->93961 93974->93969 93975->93968 93977 6bae01 93976->93977 93980 6bae1c ISource 93976->93980 94043 6baec9 93977->94043 93979 6bae09 CharUpperBuffW 93979->93980 93980->93883 93982 6bacae 93981->93982 93983 6bacd1 93982->93983 94049 72359c 82 API calls __wsopen_s 93982->94049 93983->93936 93986 6ffadb 93985->93986 93987 6bad92 93985->93987 93988 6cfddb 22 API calls 93987->93988 93989 6bad99 93988->93989 94050 6badcd 93989->94050 93992->93935 93997 6cfddb 93993->93997 93994 6dea0c ___std_exception_copy 21 API calls 93994->93997 93995 6cfdfa 93995->93905 93997->93994 93997->93995 93999 6cfdfc 93997->93999 94063 6d4ead 7 API calls 2 library calls 93997->94063 93998 6d066d 94065 6d32a4 RaiseException 93998->94065 93999->93998 94064 6d32a4 RaiseException 93999->94064 94001 6d068a 94001->93905 94003->93935 94004->93888 94005->93922 94006->93892 94007->93922 94008->93922 94009->93936 94010->93936 94011->93936 94012->93936 94013->93936 94020 6bec76 ISource 94014->94020 94015 6d0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 94015->94020 94016 6d01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 94016->94020 94017 704beb 94073 72359c 82 API calls __wsopen_s 94017->94073 94019 6bfef7 94028 6bed9d ISource 94019->94028 94069 6ba8c7 22 API calls __fread_nolock 94019->94069 94020->94015 94020->94016 94020->94017 94020->94019 94021 6cfddb 22 API calls 94020->94021 94023 704b0b 94020->94023 94024 6ba8c7 22 API calls 94020->94024 94025 704600 94020->94025 94020->94028 94032 6bfbe3 94020->94032 94033 6ba961 22 API calls 94020->94033 94036 6d00a3 29 API calls pre_c_initialization 94020->94036 94037 6bf3ae ISource 94020->94037 94066 6c01e0 348 API calls 2 library calls 94020->94066 94067 6c06a0 41 API calls ISource 94020->94067 94021->94020 94071 72359c 82 API calls __wsopen_s 94023->94071 94024->94020 94025->94028 94068 6ba8c7 22 API calls __fread_nolock 94025->94068 94028->93911 94032->94028 94034 704bdc 94032->94034 94032->94037 94033->94020 94072 72359c 82 API calls __wsopen_s 94034->94072 94036->94020 94037->94028 94070 72359c 82 API calls __wsopen_s 94037->94070 94038->93914 94039->93922 94040->93920 94041->93921 94042->93922 94044 6baedc 94043->94044 94048 6baed9 __fread_nolock 94043->94048 94045 6cfddb 22 API calls 94044->94045 94046 6baee7 94045->94046 94047 6cfe0b 22 API calls 94046->94047 94047->94048 94048->93979 94049->93983 94054 6baddd 94050->94054 94051 6badb6 94051->93936 94052 6cfddb 22 API calls 94052->94054 94054->94051 94054->94052 94055 6badcd 22 API calls 94054->94055 94057 6ba961 94054->94057 94062 6ba8c7 22 API calls __fread_nolock 94054->94062 94055->94054 94058 6cfe0b 22 API calls 94057->94058 94059 6ba976 94058->94059 94060 6cfddb 22 API calls 94059->94060 94061 6ba984 94060->94061 94061->94054 94062->94054 94063->93997 94064->93998 94065->94001 94066->94020 94067->94020 94068->94028 94069->94028 94070->94028 94071->94028 94072->94017 94073->94028 94074 6b1cad SystemParametersInfoW 94075 6b2de3 94076 6b2df0 __wsopen_s 94075->94076 94077 6b2e09 94076->94077 94078 6f2c2b ___scrt_fastfail 94076->94078 94091 6b3aa2 94077->94091 94080 6f2c47 GetOpenFileNameW 94078->94080 94082 6f2c96 94080->94082 94148 6b6b57 94082->94148 94086 6f2cab 94086->94086 94088 6b2e27 94119 6b44a8 94088->94119 94160 6f1f50 94091->94160 94094 6b3ae9 94166 6ba6c3 94094->94166 94095 6b3ace 94097 6b6b57 22 API calls 94095->94097 94098 6b3ada 94097->94098 94162 6b37a0 94098->94162 94101 6b2da5 94102 6f1f50 __wsopen_s 94101->94102 94103 6b2db2 GetLongPathNameW 94102->94103 94104 6b6b57 22 API calls 94103->94104 94105 6b2dda 94104->94105 94106 6b3598 94105->94106 94107 6ba961 22 API calls 94106->94107 94108 6b35aa 94107->94108 94109 6b3aa2 23 API calls 94108->94109 94110 6b35b5 94109->94110 94111 6b35c0 94110->94111 94115 6f32eb 94110->94115 94176 6b515f 94111->94176 94116 6f330d 94115->94116 94188 6cce60 41 API calls 94115->94188 94118 6b35df 94118->94088 94189 6b4ecb 94119->94189 94122 6f3833 94211 722cf9 94122->94211 94124 6b4ecb 94 API calls 94126 6b44e1 94124->94126 94125 6f3848 94128 6f384c 94125->94128 94129 6f3869 94125->94129 94126->94122 94127 6b44e9 94126->94127 94130 6f3854 94127->94130 94131 6b44f5 94127->94131 94238 6b4f39 94128->94238 94133 6cfe0b 22 API calls 94129->94133 94244 71da5a 82 API calls 94130->94244 94237 6b940c 136 API calls 2 library calls 94131->94237 94147 6f38ae 94133->94147 94136 6b2e31 94137 6f3862 94137->94129 94138 6b4f39 68 API calls 94142 6f3a5f 94138->94142 94142->94138 94250 71989b 82 API calls __wsopen_s 94142->94250 94144 6b9cb3 22 API calls 94144->94147 94147->94142 94147->94144 94245 71967e 22 API calls __fread_nolock 94147->94245 94246 7195ad 42 API calls _wcslen 94147->94246 94247 720b5a 22 API calls 94147->94247 94248 6ba4a1 22 API calls __fread_nolock 94147->94248 94249 6b3ff7 22 API calls 94147->94249 94149 6b6b67 _wcslen 94148->94149 94150 6f4ba1 94148->94150 94153 6b6b7d 94149->94153 94154 6b6ba2 94149->94154 94151 6b93b2 22 API calls 94150->94151 94152 6f4baa 94151->94152 94152->94152 94534 6b6f34 22 API calls 94153->94534 94156 6cfddb 22 API calls 94154->94156 94158 6b6bae 94156->94158 94157 6b6b85 __fread_nolock 94157->94086 94159 6cfe0b 22 API calls 94158->94159 94159->94157 94161 6b3aaf GetFullPathNameW 94160->94161 94161->94094 94161->94095 94163 6b37ae 94162->94163 94172 6b93b2 94163->94172 94165 6b2e12 94165->94101 94167 6ba6dd 94166->94167 94168 6ba6d0 94166->94168 94169 6cfddb 22 API calls 94167->94169 94168->94098 94170 6ba6e7 94169->94170 94171 6cfe0b 22 API calls 94170->94171 94171->94168 94173 6b93c0 94172->94173 94175 6b93c9 __fread_nolock 94172->94175 94174 6baec9 22 API calls 94173->94174 94173->94175 94174->94175 94175->94165 94177 6b516e 94176->94177 94181 6b518f __fread_nolock 94176->94181 94180 6cfe0b 22 API calls 94177->94180 94178 6cfddb 22 API calls 94179 6b35cc 94178->94179 94182 6b35f3 94179->94182 94180->94181 94181->94178 94183 6b3605 94182->94183 94187 6b3624 __fread_nolock 94182->94187 94186 6cfe0b 22 API calls 94183->94186 94184 6cfddb 22 API calls 94185 6b363b 94184->94185 94185->94118 94186->94187 94187->94184 94188->94115 94251 6b4e90 LoadLibraryA 94189->94251 94194 6f3ccf 94196 6b4f39 68 API calls 94194->94196 94195 6b4ef6 LoadLibraryExW 94259 6b4e59 LoadLibraryA 94195->94259 94198 6f3cd6 94196->94198 94200 6b4e59 3 API calls 94198->94200 94203 6f3cde 94200->94203 94202 6b4f20 94202->94203 94204 6b4f2c 94202->94204 94281 6b50f5 40 API calls __fread_nolock 94203->94281 94205 6b4f39 68 API calls 94204->94205 94207 6b44cd 94205->94207 94207->94122 94207->94124 94208 6f3cf5 94282 7228fe 27 API calls 94208->94282 94210 6f3d05 94212 722d15 94211->94212 94365 6b511f 64 API calls 94212->94365 94214 722d29 94366 722e66 75 API calls 94214->94366 94216 722d3b 94217 722d3f 94216->94217 94367 6b50f5 40 API calls __fread_nolock 94216->94367 94217->94125 94219 722d56 94368 6b50f5 40 API calls __fread_nolock 94219->94368 94221 722d66 94369 6b50f5 40 API calls __fread_nolock 94221->94369 94223 722d81 94370 6b50f5 40 API calls __fread_nolock 94223->94370 94225 722d9c 94371 6b511f 64 API calls 94225->94371 94227 722db3 94228 6dea0c ___std_exception_copy 21 API calls 94227->94228 94229 722dba 94228->94229 94230 6dea0c ___std_exception_copy 21 API calls 94229->94230 94231 722dc4 94230->94231 94372 6b50f5 40 API calls __fread_nolock 94231->94372 94233 722dd8 94373 7228fe 27 API calls 94233->94373 94235 722dee 94235->94217 94374 7222ce 94235->94374 94237->94136 94239 6b4f4a 94238->94239 94240 6b4f43 94238->94240 94242 6b4f6a FreeLibrary 94239->94242 94243 6b4f59 94239->94243 94241 6de678 67 API calls 94240->94241 94241->94239 94242->94243 94243->94130 94244->94137 94245->94147 94246->94147 94247->94147 94248->94147 94249->94147 94250->94142 94252 6b4ea8 GetProcAddress 94251->94252 94253 6b4ec6 94251->94253 94254 6b4eb8 94252->94254 94256 6de5eb 94253->94256 94254->94253 94255 6b4ebf FreeLibrary 94254->94255 94255->94253 94283 6de52a 94256->94283 94258 6b4eea 94258->94194 94258->94195 94260 6b4e6e GetProcAddress 94259->94260 94261 6b4e8d 94259->94261 94262 6b4e7e 94260->94262 94264 6b4f80 94261->94264 94262->94261 94263 6b4e86 FreeLibrary 94262->94263 94263->94261 94265 6cfe0b 22 API calls 94264->94265 94266 6b4f95 94265->94266 94351 6b5722 94266->94351 94268 6b4fa1 __fread_nolock 94269 6b4fdc 94268->94269 94270 6f3d1d 94268->94270 94271 6b50a5 94268->94271 94275 6f3d22 94269->94275 94279 6b506e ISource 94269->94279 94360 6b50f5 40 API calls __fread_nolock 94269->94360 94361 6b511f 64 API calls 94269->94361 94362 72304d 74 API calls 94270->94362 94354 6b42a2 CreateStreamOnHGlobal 94271->94354 94363 6b511f 64 API calls 94275->94363 94277 6f3d45 94364 6b50f5 40 API calls __fread_nolock 94277->94364 94279->94202 94281->94208 94282->94210 94286 6de536 ___scrt_is_nonwritable_in_current_image 94283->94286 94284 6de544 94308 6df2d9 20 API calls __dosmaperr 94284->94308 94286->94284 94288 6de574 94286->94288 94287 6de549 94309 6e27ec 26 API calls __fread_nolock 94287->94309 94290 6de579 94288->94290 94291 6de586 94288->94291 94310 6df2d9 20 API calls __dosmaperr 94290->94310 94300 6e8061 94291->94300 94294 6de58f 94295 6de595 94294->94295 94296 6de5a2 94294->94296 94311 6df2d9 20 API calls __dosmaperr 94295->94311 94312 6de5d4 LeaveCriticalSection __fread_nolock 94296->94312 94298 6de554 __fread_nolock 94298->94258 94301 6e806d ___scrt_is_nonwritable_in_current_image 94300->94301 94313 6e2f5e EnterCriticalSection 94301->94313 94303 6e807b 94314 6e80fb 94303->94314 94307 6e80ac __fread_nolock 94307->94294 94308->94287 94309->94298 94310->94298 94311->94298 94312->94298 94313->94303 94315 6e811e 94314->94315 94316 6e8177 94315->94316 94323 6e8088 94315->94323 94330 6d918d EnterCriticalSection 94315->94330 94331 6d91a1 LeaveCriticalSection 94315->94331 94332 6e4c7d 94316->94332 94321 6e8189 94321->94323 94345 6e3405 11 API calls 2 library calls 94321->94345 94327 6e80b7 94323->94327 94324 6e81a8 94346 6d918d EnterCriticalSection 94324->94346 94350 6e2fa6 LeaveCriticalSection 94327->94350 94329 6e80be 94329->94307 94330->94315 94331->94315 94337 6e4c8a __dosmaperr 94332->94337 94333 6e4cca 94348 6df2d9 20 API calls __dosmaperr 94333->94348 94334 6e4cb5 RtlAllocateHeap 94335 6e4cc8 94334->94335 94334->94337 94339 6e29c8 94335->94339 94337->94333 94337->94334 94347 6d4ead 7 API calls 2 library calls 94337->94347 94340 6e29d3 RtlFreeHeap 94339->94340 94341 6e29fc __dosmaperr 94339->94341 94340->94341 94342 6e29e8 94340->94342 94341->94321 94349 6df2d9 20 API calls __dosmaperr 94342->94349 94344 6e29ee GetLastError 94344->94341 94345->94324 94346->94323 94347->94337 94348->94335 94349->94344 94350->94329 94352 6cfddb 22 API calls 94351->94352 94353 6b5734 94352->94353 94353->94268 94355 6b42bc FindResourceExW 94354->94355 94359 6b42d9 94354->94359 94356 6f35ba LoadResource 94355->94356 94355->94359 94357 6f35cf SizeofResource 94356->94357 94356->94359 94358 6f35e3 LockResource 94357->94358 94357->94359 94358->94359 94359->94269 94360->94269 94361->94269 94362->94275 94363->94277 94364->94279 94365->94214 94366->94216 94367->94219 94368->94221 94369->94223 94370->94225 94371->94227 94372->94233 94373->94235 94375 7222e7 94374->94375 94376 7222d9 94374->94376 94378 72232c 94375->94378 94379 6de5eb 29 API calls 94375->94379 94390 7222f0 94375->94390 94377 6de5eb 29 API calls 94376->94377 94377->94375 94403 722557 40 API calls __fread_nolock 94378->94403 94380 722311 94379->94380 94380->94378 94382 72231a 94380->94382 94382->94390 94411 6de678 94382->94411 94383 722370 94384 722374 94383->94384 94385 722395 94383->94385 94386 722381 94384->94386 94389 6de678 67 API calls 94384->94389 94404 722171 94385->94404 94386->94390 94392 6de678 67 API calls 94386->94392 94389->94386 94390->94217 94391 72239d 94393 7223c3 94391->94393 94394 7223a3 94391->94394 94392->94390 94424 7223f3 74 API calls 94393->94424 94396 6de678 67 API calls 94394->94396 94398 7223b0 94394->94398 94396->94398 94397 6de678 67 API calls 94397->94390 94398->94390 94398->94397 94399 7223ca 94400 7223de 94399->94400 94401 6de678 67 API calls 94399->94401 94400->94390 94402 6de678 67 API calls 94400->94402 94401->94400 94402->94390 94403->94383 94405 6dea0c ___std_exception_copy 21 API calls 94404->94405 94406 72217f 94405->94406 94407 6dea0c ___std_exception_copy 21 API calls 94406->94407 94408 722190 94407->94408 94409 6dea0c ___std_exception_copy 21 API calls 94408->94409 94410 72219c 94409->94410 94410->94391 94412 6de684 ___scrt_is_nonwritable_in_current_image 94411->94412 94413 6de6aa 94412->94413 94414 6de695 94412->94414 94423 6de6a5 __fread_nolock 94413->94423 94425 6d918d EnterCriticalSection 94413->94425 94442 6df2d9 20 API calls __dosmaperr 94414->94442 94417 6de69a 94443 6e27ec 26 API calls __fread_nolock 94417->94443 94418 6de6c6 94426 6de602 94418->94426 94421 6de6d1 94444 6de6ee LeaveCriticalSection __fread_nolock 94421->94444 94423->94390 94424->94399 94425->94418 94427 6de60f 94426->94427 94428 6de624 94426->94428 94477 6df2d9 20 API calls __dosmaperr 94427->94477 94434 6de61f 94428->94434 94445 6ddc0b 94428->94445 94431 6de614 94478 6e27ec 26 API calls __fread_nolock 94431->94478 94434->94421 94438 6de646 94462 6e862f 94438->94462 94441 6e29c8 _free 20 API calls 94441->94434 94442->94417 94443->94423 94444->94423 94446 6ddc1f 94445->94446 94447 6ddc23 94445->94447 94451 6e4d7a 94446->94451 94447->94446 94448 6dd955 __fread_nolock 26 API calls 94447->94448 94449 6ddc43 94448->94449 94479 6e59be 62 API calls 4 library calls 94449->94479 94452 6de640 94451->94452 94453 6e4d90 94451->94453 94455 6dd955 94452->94455 94453->94452 94454 6e29c8 _free 20 API calls 94453->94454 94454->94452 94456 6dd976 94455->94456 94457 6dd961 94455->94457 94456->94438 94480 6df2d9 20 API calls __dosmaperr 94457->94480 94459 6dd966 94481 6e27ec 26 API calls __fread_nolock 94459->94481 94461 6dd971 94461->94438 94463 6e863e 94462->94463 94464 6e8653 94462->94464 94485 6df2c6 20 API calls __dosmaperr 94463->94485 94466 6e868e 94464->94466 94470 6e867a 94464->94470 94487 6df2c6 20 API calls __dosmaperr 94466->94487 94467 6e8643 94486 6df2d9 20 API calls __dosmaperr 94467->94486 94482 6e8607 94470->94482 94471 6e8693 94488 6df2d9 20 API calls __dosmaperr 94471->94488 94474 6de64c 94474->94434 94474->94441 94475 6e869b 94489 6e27ec 26 API calls __fread_nolock 94475->94489 94477->94431 94478->94434 94479->94446 94480->94459 94481->94461 94490 6e8585 94482->94490 94484 6e862b 94484->94474 94485->94467 94486->94474 94487->94471 94488->94475 94489->94474 94491 6e8591 ___scrt_is_nonwritable_in_current_image 94490->94491 94501 6e5147 EnterCriticalSection 94491->94501 94493 6e859f 94494 6e85c6 94493->94494 94495 6e85d1 94493->94495 94502 6e86ae 94494->94502 94517 6df2d9 20 API calls __dosmaperr 94495->94517 94498 6e85cc 94518 6e85fb LeaveCriticalSection __wsopen_s 94498->94518 94500 6e85ee __fread_nolock 94500->94484 94501->94493 94519 6e53c4 94502->94519 94504 6e86be 94505 6e86c4 94504->94505 94506 6e86f6 94504->94506 94508 6e53c4 __wsopen_s 26 API calls 94504->94508 94532 6e5333 21 API calls 2 library calls 94505->94532 94506->94505 94509 6e53c4 __wsopen_s 26 API calls 94506->94509 94511 6e86ed 94508->94511 94512 6e8702 CloseHandle 94509->94512 94510 6e871c 94513 6e873e 94510->94513 94533 6df2a3 20 API calls __dosmaperr 94510->94533 94515 6e53c4 __wsopen_s 26 API calls 94511->94515 94512->94505 94516 6e870e GetLastError 94512->94516 94513->94498 94515->94506 94516->94505 94517->94498 94518->94500 94520 6e53d1 94519->94520 94522 6e53e6 94519->94522 94521 6df2c6 __dosmaperr 20 API calls 94520->94521 94523 6e53d6 94521->94523 94524 6df2c6 __dosmaperr 20 API calls 94522->94524 94526 6e540b 94522->94526 94525 6df2d9 __dosmaperr 20 API calls 94523->94525 94527 6e5416 94524->94527 94528 6e53de 94525->94528 94526->94504 94529 6df2d9 __dosmaperr 20 API calls 94527->94529 94528->94504 94530 6e541e 94529->94530 94531 6e27ec __fread_nolock 26 API calls 94530->94531 94531->94528 94532->94510 94533->94513 94534->94157 94535 6f2ba5 94536 6f2baf 94535->94536 94537 6b2b25 94535->94537 94581 6b3a5a 94536->94581 94563 6b2b83 7 API calls 94537->94563 94541 6f2bb8 94588 6b9cb3 94541->94588 94544 6b2b2f 94553 6b2b44 94544->94553 94567 6b3837 94544->94567 94545 6f2bc6 94546 6f2bce 94545->94546 94547 6f2bf5 94545->94547 94594 6b33c6 94546->94594 94550 6b33c6 22 API calls 94547->94550 94561 6f2bf1 GetForegroundWindow ShellExecuteW 94550->94561 94554 6b2b5f 94553->94554 94577 6b30f2 94553->94577 94559 6b2b66 SetCurrentDirectoryW 94554->94559 94556 6f2c26 94556->94554 94558 6f2be7 94560 6b33c6 22 API calls 94558->94560 94562 6b2b7a 94559->94562 94560->94561 94561->94556 94604 6b2cd4 7 API calls 94563->94604 94565 6b2b2a 94566 6b2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 94565->94566 94566->94544 94568 6b3862 ___scrt_fastfail 94567->94568 94605 6b4212 94568->94605 94571 6b38e8 94573 6f3386 Shell_NotifyIconW 94571->94573 94574 6b3906 Shell_NotifyIconW 94571->94574 94609 6b3923 94574->94609 94576 6b391c 94576->94553 94578 6b3154 94577->94578 94579 6b3104 ___scrt_fastfail 94577->94579 94578->94554 94580 6b3123 Shell_NotifyIconW 94579->94580 94580->94578 94582 6f1f50 __wsopen_s 94581->94582 94583 6b3a67 GetModuleFileNameW 94582->94583 94584 6b9cb3 22 API calls 94583->94584 94585 6b3a8d 94584->94585 94586 6b3aa2 23 API calls 94585->94586 94587 6b3a97 94586->94587 94587->94541 94589 6b9cc2 _wcslen 94588->94589 94590 6cfe0b 22 API calls 94589->94590 94591 6b9cea __fread_nolock 94590->94591 94592 6cfddb 22 API calls 94591->94592 94593 6b9d00 94592->94593 94593->94545 94595 6f30bb 94594->94595 94596 6b33dd 94594->94596 94598 6cfddb 22 API calls 94595->94598 94640 6b33ee 94596->94640 94600 6f30c5 _wcslen 94598->94600 94599 6b33e8 94603 6b6350 22 API calls 94599->94603 94601 6cfe0b 22 API calls 94600->94601 94602 6f30fe __fread_nolock 94601->94602 94603->94558 94604->94565 94606 6f35a4 94605->94606 94607 6b38b7 94605->94607 94606->94607 94608 6f35ad DestroyIcon 94606->94608 94607->94571 94631 71c874 42 API calls _strftime 94607->94631 94608->94607 94610 6b393f 94609->94610 94611 6b3a13 94609->94611 94632 6b6270 94610->94632 94611->94576 94614 6b395a 94616 6b6b57 22 API calls 94614->94616 94615 6f3393 LoadStringW 94617 6f33ad 94615->94617 94618 6b396f 94616->94618 94625 6b3994 ___scrt_fastfail 94617->94625 94638 6ba8c7 22 API calls __fread_nolock 94617->94638 94619 6f33c9 94618->94619 94620 6b397c 94618->94620 94639 6b6350 22 API calls 94619->94639 94620->94617 94622 6b3986 94620->94622 94637 6b6350 22 API calls 94622->94637 94628 6b39f9 Shell_NotifyIconW 94625->94628 94626 6f33d7 94626->94625 94627 6b33c6 22 API calls 94626->94627 94629 6f33f9 94627->94629 94628->94611 94630 6b33c6 22 API calls 94629->94630 94630->94625 94631->94571 94633 6cfe0b 22 API calls 94632->94633 94634 6b6295 94633->94634 94635 6cfddb 22 API calls 94634->94635 94636 6b394d 94635->94636 94636->94614 94636->94615 94637->94625 94638->94625 94639->94626 94641 6b33fe _wcslen 94640->94641 94642 6f311d 94641->94642 94643 6b3411 94641->94643 94645 6cfddb 22 API calls 94642->94645 94650 6ba587 94643->94650 94647 6f3127 94645->94647 94646 6b341e __fread_nolock 94646->94599 94648 6cfe0b 22 API calls 94647->94648 94649 6f3157 __fread_nolock 94648->94649 94651 6ba59d 94650->94651 94654 6ba598 __fread_nolock 94650->94654 94652 6cfe0b 22 API calls 94651->94652 94653 6ff80f 94651->94653 94652->94654 94654->94646 94655 6e8402 94660 6e81be 94655->94660 94659 6e842a 94665 6e81ef try_get_first_available_module 94660->94665 94662 6e83ee 94679 6e27ec 26 API calls __fread_nolock 94662->94679 94664 6e8343 94664->94659 94672 6f0984 94664->94672 94665->94665 94668 6e8338 94665->94668 94675 6d8e0b 40 API calls 2 library calls 94665->94675 94667 6e838c 94667->94668 94676 6d8e0b 40 API calls 2 library calls 94667->94676 94668->94664 94678 6df2d9 20 API calls __dosmaperr 94668->94678 94670 6e83ab 94670->94668 94677 6d8e0b 40 API calls 2 library calls 94670->94677 94680 6f0081 94672->94680 94674 6f099f 94674->94659 94675->94667 94676->94670 94677->94668 94678->94662 94679->94664 94682 6f008d ___scrt_is_nonwritable_in_current_image 94680->94682 94681 6f009b 94737 6df2d9 20 API calls __dosmaperr 94681->94737 94682->94681 94684 6f00d4 94682->94684 94691 6f065b 94684->94691 94685 6f00a0 94738 6e27ec 26 API calls __fread_nolock 94685->94738 94690 6f00aa __fread_nolock 94690->94674 94692 6f0678 94691->94692 94693 6f068d 94692->94693 94694 6f06a6 94692->94694 94754 6df2c6 20 API calls __dosmaperr 94693->94754 94740 6e5221 94694->94740 94697 6f06ab 94699 6f06cb 94697->94699 94700 6f06b4 94697->94700 94698 6f0692 94755 6df2d9 20 API calls __dosmaperr 94698->94755 94753 6f039a CreateFileW 94699->94753 94756 6df2c6 20 API calls __dosmaperr 94700->94756 94704 6f06b9 94757 6df2d9 20 API calls __dosmaperr 94704->94757 94706 6f0781 GetFileType 94707 6f078c GetLastError 94706->94707 94708 6f07d3 94706->94708 94760 6df2a3 20 API calls __dosmaperr 94707->94760 94762 6e516a 21 API calls 2 library calls 94708->94762 94709 6f0756 GetLastError 94759 6df2a3 20 API calls __dosmaperr 94709->94759 94712 6f0704 94712->94706 94712->94709 94758 6f039a CreateFileW 94712->94758 94713 6f079a CloseHandle 94713->94698 94715 6f07c3 94713->94715 94761 6df2d9 20 API calls __dosmaperr 94715->94761 94717 6f0749 94717->94706 94717->94709 94718 6f07f4 94720 6f0840 94718->94720 94763 6f05ab 72 API calls 3 library calls 94718->94763 94725 6f086d 94720->94725 94764 6f014d 72 API calls 4 library calls 94720->94764 94721 6f07c8 94721->94698 94724 6f0866 94724->94725 94727 6f087e 94724->94727 94726 6e86ae __wsopen_s 29 API calls 94725->94726 94728 6f00f8 94726->94728 94727->94728 94729 6f08fc CloseHandle 94727->94729 94739 6f0121 LeaveCriticalSection __wsopen_s 94728->94739 94765 6f039a CreateFileW 94729->94765 94731 6f0927 94732 6f095d 94731->94732 94733 6f0931 GetLastError 94731->94733 94732->94728 94766 6df2a3 20 API calls __dosmaperr 94733->94766 94735 6f093d 94767 6e5333 21 API calls 2 library calls 94735->94767 94737->94685 94738->94690 94739->94690 94741 6e522d ___scrt_is_nonwritable_in_current_image 94740->94741 94768 6e2f5e EnterCriticalSection 94741->94768 94744 6e5259 94772 6e5000 94744->94772 94746 6e52a4 __fread_nolock 94746->94697 94747 6e5234 94747->94744 94749 6e52c7 EnterCriticalSection 94747->94749 94751 6e527b 94747->94751 94750 6e52d4 LeaveCriticalSection 94749->94750 94749->94751 94750->94747 94769 6e532a 94751->94769 94753->94712 94754->94698 94755->94728 94756->94704 94757->94698 94758->94717 94759->94698 94760->94713 94761->94721 94762->94718 94763->94720 94764->94724 94765->94731 94766->94735 94767->94732 94768->94747 94780 6e2fa6 LeaveCriticalSection 94769->94780 94771 6e5331 94771->94746 94773 6e4c7d __dosmaperr 20 API calls 94772->94773 94775 6e5012 94773->94775 94774 6e501f 94776 6e29c8 _free 20 API calls 94774->94776 94775->94774 94781 6e3405 11 API calls 2 library calls 94775->94781 94777 6e5071 94776->94777 94777->94751 94779 6e5147 EnterCriticalSection 94777->94779 94779->94751 94780->94771 94781->94775 94782 6b6a26 94783 6cfddb 22 API calls 94782->94783 94784 6b6a33 94783->94784 94785 6f2402 94788 6b1410 94785->94788 94789 6b144f mciSendStringW 94788->94789 94790 6f24b8 DestroyWindow 94788->94790 94791 6b146b 94789->94791 94792 6b16c6 94789->94792 94803 6f24c4 94790->94803 94793 6b1479 94791->94793 94791->94803 94792->94791 94794 6b16d5 UnregisterHotKey 94792->94794 94821 6b182e 94793->94821 94794->94792 94796 6f2509 94802 6f251c FreeLibrary 94796->94802 94804 6f252d 94796->94804 94797 6f24d8 94797->94803 94827 6b6246 CloseHandle 94797->94827 94798 6f24e2 FindClose 94798->94803 94801 6b148e 94801->94804 94809 6b149c 94801->94809 94802->94796 94803->94796 94803->94797 94803->94798 94805 6f2541 VirtualFree 94804->94805 94812 6b1509 94804->94812 94805->94804 94806 6b14f8 CoUninitialize 94806->94812 94807 6f2589 94814 6f2598 ISource 94807->94814 94828 7232eb 6 API calls ISource 94807->94828 94808 6b1514 94811 6b1524 94808->94811 94809->94806 94825 6b1944 VirtualFreeEx CloseHandle 94811->94825 94812->94807 94812->94808 94817 6f2627 94814->94817 94829 7164d4 22 API calls ISource 94814->94829 94816 6b153a 94816->94814 94818 6b161f 94816->94818 94817->94817 94818->94817 94826 6b1876 CloseHandle InternetCloseHandle InternetCloseHandle WaitForSingleObject 94818->94826 94820 6b16c1 94822 6b183b 94821->94822 94823 6b1480 94822->94823 94830 71702a 22 API calls 94822->94830 94823->94796 94823->94801 94825->94816 94826->94820 94827->94797 94828->94807 94829->94814 94830->94822 94831 6bdee5 94834 6bb710 94831->94834 94835 6bb72b 94834->94835 94836 700146 94835->94836 94837 7000f8 94835->94837 94860 6bb750 94835->94860 94889 7358a2 348 API calls 2 library calls 94836->94889 94840 700102 94837->94840 94843 70010f 94837->94843 94837->94860 94887 735d33 348 API calls 94840->94887 94861 6bba20 94843->94861 94888 7361d0 348 API calls 2 library calls 94843->94888 94846 6bbbe0 40 API calls 94846->94860 94847 7003d9 94847->94847 94850 6cd336 40 API calls 94850->94860 94851 6bba4e 94853 700322 94892 735c0c 82 API calls 94853->94892 94858 6baceb 23 API calls 94858->94860 94860->94846 94860->94850 94860->94851 94860->94853 94860->94858 94860->94861 94862 6bec40 348 API calls 94860->94862 94865 6ca01b 94860->94865 94879 6ba81b 41 API calls 94860->94879 94880 6cd2f0 40 API calls 94860->94880 94881 6d0242 5 API calls __Init_thread_wait 94860->94881 94882 6cedcd 22 API calls 94860->94882 94883 6d00a3 29 API calls __onexit 94860->94883 94884 6d01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 94860->94884 94885 6cee53 82 API calls 94860->94885 94886 6ce5ca 348 API calls 94860->94886 94890 70f6bf 23 API calls 94860->94890 94891 6ba8c7 22 API calls __fread_nolock 94860->94891 94861->94851 94893 72359c 82 API calls __wsopen_s 94861->94893 94862->94860 94866 6ca11a 94865->94866 94877 6ca060 94865->94877 94894 6b63eb 22 API calls 94866->94894 94868 6bec40 348 API calls 94868->94877 94869 6ca186 94896 6ca836 22 API calls 94869->94896 94871 6ca16b 94873 6ca175 94871->94873 94897 72359c 82 API calls __wsopen_s 94871->94897 94873->94860 94874 707908 94875 6ca124 94875->94871 94895 6b6a50 22 API calls 94875->94895 94877->94866 94877->94868 94877->94869 94877->94871 94878 6bb567 39 API calls 94877->94878 94878->94877 94879->94860 94880->94860 94881->94860 94882->94860 94883->94860 94884->94860 94885->94860 94886->94860 94887->94843 94888->94861 94889->94860 94890->94860 94891->94860 94892->94861 94893->94847 94894->94875 94895->94871 94896->94873 94897->94874 94898 6b1044 94903 6b10f3 94898->94903 94900 6b104a 94939 6d00a3 29 API calls __onexit 94900->94939 94902 6b1054 94940 6b1398 94903->94940 94907 6b116a 94908 6ba961 22 API calls 94907->94908 94909 6b1174 94908->94909 94910 6ba961 22 API calls 94909->94910 94911 6b117e 94910->94911 94912 6ba961 22 API calls 94911->94912 94913 6b1188 94912->94913 94914 6ba961 22 API calls 94913->94914 94915 6b11c6 94914->94915 94916 6ba961 22 API calls 94915->94916 94917 6b1292 94916->94917 94950 6b171c 94917->94950 94921 6b12c4 94922 6ba961 22 API calls 94921->94922 94923 6b12ce 94922->94923 94971 6c1940 94923->94971 94925 6b12f9 94981 6b1aab 94925->94981 94927 6b1315 94928 6b1325 GetStdHandle 94927->94928 94929 6b137a 94928->94929 94930 6f2485 94928->94930 94933 6b1387 OleInitialize 94929->94933 94930->94929 94931 6f248e 94930->94931 94932 6cfddb 22 API calls 94931->94932 94934 6f2495 94932->94934 94933->94900 94988 72011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 94934->94988 94936 6f249e 94989 720944 CreateThread 94936->94989 94938 6f24aa CloseHandle 94938->94929 94939->94902 94990 6b13f1 94940->94990 94943 6b13f1 22 API calls 94944 6b13d0 94943->94944 94945 6ba961 22 API calls 94944->94945 94946 6b13dc 94945->94946 94947 6b6b57 22 API calls 94946->94947 94948 6b1129 94947->94948 94949 6b1bc3 6 API calls 94948->94949 94949->94907 94951 6ba961 22 API calls 94950->94951 94952 6b172c 94951->94952 94953 6ba961 22 API calls 94952->94953 94954 6b1734 94953->94954 94955 6ba961 22 API calls 94954->94955 94956 6b174f 94955->94956 94957 6cfddb 22 API calls 94956->94957 94958 6b129c 94957->94958 94959 6b1b4a 94958->94959 94960 6b1b58 94959->94960 94961 6ba961 22 API calls 94960->94961 94962 6b1b63 94961->94962 94963 6ba961 22 API calls 94962->94963 94964 6b1b6e 94963->94964 94965 6ba961 22 API calls 94964->94965 94966 6b1b79 94965->94966 94967 6ba961 22 API calls 94966->94967 94968 6b1b84 94967->94968 94969 6cfddb 22 API calls 94968->94969 94970 6b1b96 RegisterWindowMessageW 94969->94970 94970->94921 94972 6c1981 94971->94972 94978 6c195d 94971->94978 94997 6d0242 5 API calls __Init_thread_wait 94972->94997 94973 6c196e 94973->94925 94976 6c198b 94976->94978 94998 6d01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 94976->94998 94977 6c8727 94977->94973 95000 6d01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 94977->95000 94978->94973 94999 6d0242 5 API calls __Init_thread_wait 94978->94999 94982 6b1abb 94981->94982 94983 6f272d 94981->94983 94984 6cfddb 22 API calls 94982->94984 95001 723209 23 API calls 94983->95001 94986 6b1ac3 94984->94986 94986->94927 94987 6f2738 94988->94936 94989->94938 95002 72092a 28 API calls 94989->95002 94991 6ba961 22 API calls 94990->94991 94992 6b13fc 94991->94992 94993 6ba961 22 API calls 94992->94993 94994 6b1404 94993->94994 94995 6ba961 22 API calls 94994->94995 94996 6b13c6 94995->94996 94996->94943 94997->94976 94998->94978 94999->94977 95000->94973 95001->94987 95003 6b105b 95008 6b344d 95003->95008 95005 6b106a 95039 6d00a3 29 API calls __onexit 95005->95039 95007 6b1074 95009 6b345d __wsopen_s 95008->95009 95010 6ba961 22 API calls 95009->95010 95011 6b3513 95010->95011 95012 6b3a5a 24 API calls 95011->95012 95013 6b351c 95012->95013 95040 6b3357 95013->95040 95016 6b33c6 22 API calls 95017 6b3535 95016->95017 95018 6b515f 22 API calls 95017->95018 95019 6b3544 95018->95019 95020 6ba961 22 API calls 95019->95020 95021 6b354d 95020->95021 95022 6ba6c3 22 API calls 95021->95022 95023 6b3556 RegOpenKeyExW 95022->95023 95024 6f3176 RegQueryValueExW 95023->95024 95028 6b3578 95023->95028 95025 6f320c RegCloseKey 95024->95025 95026 6f3193 95024->95026 95025->95028 95038 6f321e _wcslen 95025->95038 95027 6cfe0b 22 API calls 95026->95027 95029 6f31ac 95027->95029 95028->95005 95030 6b5722 22 API calls 95029->95030 95031 6f31b7 RegQueryValueExW 95030->95031 95032 6f31d4 95031->95032 95035 6f31ee ISource 95031->95035 95033 6b6b57 22 API calls 95032->95033 95033->95035 95034 6b4c6d 22 API calls 95034->95038 95035->95025 95036 6b9cb3 22 API calls 95036->95038 95037 6b515f 22 API calls 95037->95038 95038->95028 95038->95034 95038->95036 95038->95037 95039->95007 95041 6f1f50 __wsopen_s 95040->95041 95042 6b3364 GetFullPathNameW 95041->95042 95043 6b3386 95042->95043 95044 6b6b57 22 API calls 95043->95044 95045 6b33a4 95044->95045 95045->95016 95046 702a00 95062 6bd7b0 ISource 95046->95062 95047 6bdb11 PeekMessageW 95047->95062 95048 6bd807 GetInputState 95048->95047 95048->95062 95049 701cbe TranslateAcceleratorW 95049->95062 95051 6bdb8f PeekMessageW 95051->95062 95052 6bda04 timeGetTime 95052->95062 95053 6bdb73 TranslateMessage DispatchMessageW 95053->95051 95054 6bdbaf Sleep 95054->95062 95055 702b74 Sleep 95068 702a51 95055->95068 95057 701dda timeGetTime 95147 6ce300 23 API calls 95057->95147 95061 702c0b GetExitCodeProcess 95065 702c21 WaitForSingleObject 95061->95065 95066 702c37 CloseHandle 95061->95066 95062->95047 95062->95048 95062->95049 95062->95051 95062->95052 95062->95053 95062->95054 95062->95055 95062->95057 95064 6bd9d5 95062->95064 95062->95068 95074 6bec40 348 API calls 95062->95074 95076 6bbf40 348 API calls 95062->95076 95078 6bdd50 95062->95078 95085 6c1310 95062->95085 95140 6cedf6 95062->95140 95145 6bdfd0 348 API calls 3 library calls 95062->95145 95146 6ce551 timeGetTime 95062->95146 95148 723a2a 23 API calls 95062->95148 95149 72359c 82 API calls __wsopen_s 95062->95149 95065->95062 95065->95066 95066->95068 95067 7429bf GetForegroundWindow 95067->95068 95068->95061 95068->95062 95068->95064 95068->95067 95069 702ca9 Sleep 95068->95069 95150 735658 23 API calls 95068->95150 95151 71e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 95068->95151 95152 6ce551 timeGetTime 95068->95152 95153 71d4dc CreateToolhelp32Snapshot Process32FirstW 95068->95153 95069->95062 95074->95062 95076->95062 95079 6bdd6f 95078->95079 95080 6bdd83 95078->95080 95163 6bd260 95079->95163 95195 72359c 82 API calls __wsopen_s 95080->95195 95082 6bdd7a 95082->95062 95084 702f75 95084->95084 95086 6c1376 95085->95086 95087 6c17b0 95085->95087 95089 706331 95086->95089 95090 6c1390 95086->95090 95234 6d0242 5 API calls __Init_thread_wait 95087->95234 95238 73709c 348 API calls 95089->95238 95093 6c1940 9 API calls 95090->95093 95092 6c17ba 95095 6c17fb 95092->95095 95097 6b9cb3 22 API calls 95092->95097 95096 6c13a0 95093->95096 95094 70633d 95094->95062 95101 706346 95095->95101 95102 6c182c 95095->95102 95098 6c1940 9 API calls 95096->95098 95106 6c17d4 95097->95106 95099 6c13b6 95098->95099 95099->95095 95100 6c13ec 95099->95100 95100->95101 95125 6c1408 __fread_nolock 95100->95125 95239 72359c 82 API calls __wsopen_s 95101->95239 95103 6baceb 23 API calls 95102->95103 95105 6c1839 95103->95105 95236 6cd217 348 API calls 95105->95236 95235 6d01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95106->95235 95109 70636e 95240 72359c 82 API calls __wsopen_s 95109->95240 95110 6c152f 95112 6c153c 95110->95112 95113 7063d1 95110->95113 95115 6c1940 9 API calls 95112->95115 95242 735745 54 API calls _wcslen 95113->95242 95117 6c1549 95115->95117 95116 6cfddb 22 API calls 95116->95125 95120 6c1940 9 API calls 95117->95120 95127 6c15c7 ISource 95117->95127 95118 6c1872 95237 6cfaeb 23 API calls 95118->95237 95119 6cfe0b 22 API calls 95119->95125 95128 6c1563 95120->95128 95122 6c171d 95122->95062 95124 6bec40 348 API calls 95124->95125 95125->95105 95125->95109 95125->95110 95125->95116 95125->95119 95125->95124 95125->95127 95129 7063b2 95125->95129 95126 6c167b ISource 95126->95122 95233 6cce17 22 API calls ISource 95126->95233 95127->95118 95127->95126 95130 6c1940 9 API calls 95127->95130 95205 73abf7 95127->95205 95210 73ab67 95127->95210 95213 725c5a 95127->95213 95218 741591 95127->95218 95221 6cf645 95127->95221 95228 73a2ea 95127->95228 95244 72359c 82 API calls __wsopen_s 95127->95244 95128->95127 95243 6ba8c7 22 API calls __fread_nolock 95128->95243 95241 72359c 82 API calls __wsopen_s 95129->95241 95130->95127 95141 6cee09 95140->95141 95142 6cee12 95140->95142 95141->95062 95142->95141 95143 6cee36 IsDialogMessageW 95142->95143 95144 70efaf GetClassLongW 95142->95144 95143->95141 95143->95142 95144->95142 95144->95143 95145->95062 95146->95062 95147->95062 95148->95062 95149->95062 95150->95068 95151->95068 95152->95068 95416 71def7 95153->95416 95155 71d529 Process32NextW 95156 71d5db CloseHandle 95155->95156 95157 71d522 95155->95157 95156->95068 95157->95155 95157->95156 95158 6ba961 22 API calls 95157->95158 95159 6b9cb3 22 API calls 95157->95159 95422 6b525f 22 API calls 95157->95422 95423 6b6350 22 API calls 95157->95423 95424 6cce60 41 API calls 95157->95424 95158->95157 95159->95157 95164 6bec40 348 API calls 95163->95164 95184 6bd29d 95164->95184 95165 701bc4 95204 72359c 82 API calls __wsopen_s 95165->95204 95167 6bd30b ISource 95167->95082 95168 6bd3c3 95169 6bd3ce 95168->95169 95170 6bd6d5 95168->95170 95172 6cfddb 22 API calls 95169->95172 95170->95167 95179 6cfe0b 22 API calls 95170->95179 95171 6bd5ff 95173 701bb5 95171->95173 95174 6bd614 95171->95174 95183 6bd3d5 __fread_nolock 95172->95183 95203 735705 23 API calls 95173->95203 95177 6cfddb 22 API calls 95174->95177 95175 6bd4b8 95180 6cfe0b 22 API calls 95175->95180 95187 6bd46a 95177->95187 95178 6cfddb 22 API calls 95178->95184 95179->95183 95188 6bd429 ISource __fread_nolock 95180->95188 95181 6cfddb 22 API calls 95182 6bd3f6 95181->95182 95182->95188 95196 6bbec0 348 API calls 95182->95196 95183->95181 95183->95182 95184->95165 95184->95167 95184->95168 95184->95170 95184->95175 95184->95178 95184->95188 95186 701ba4 95202 72359c 82 API calls __wsopen_s 95186->95202 95187->95082 95188->95171 95188->95186 95188->95187 95191 701b7f 95188->95191 95193 701b5d 95188->95193 95197 6b1f6f 95188->95197 95201 72359c 82 API calls __wsopen_s 95191->95201 95200 72359c 82 API calls __wsopen_s 95193->95200 95195->95084 95196->95188 95198 6bec40 348 API calls 95197->95198 95199 6b1f98 95198->95199 95199->95188 95200->95187 95201->95187 95202->95187 95203->95165 95204->95167 95245 73aff9 95205->95245 95207 73ac54 95207->95127 95208 73ac0c 95208->95207 95209 6baceb 23 API calls 95208->95209 95209->95207 95211 73aff9 217 API calls 95210->95211 95212 73ab79 95211->95212 95212->95127 95214 6b7510 53 API calls 95213->95214 95215 725c6d 95214->95215 95400 71dbbe lstrlenW 95215->95400 95217 725c77 95217->95127 95405 742ad8 95218->95405 95220 74159f 95220->95127 95222 6bb567 39 API calls 95221->95222 95223 6cf659 95222->95223 95224 70f2dc Sleep 95223->95224 95225 6cf661 timeGetTime 95223->95225 95226 6bb567 39 API calls 95225->95226 95227 6cf677 95226->95227 95227->95127 95229 6b7510 53 API calls 95228->95229 95230 73a306 95229->95230 95231 71d4dc 47 API calls 95230->95231 95232 73a315 95231->95232 95232->95127 95233->95126 95234->95092 95235->95095 95236->95118 95237->95118 95238->95094 95239->95127 95240->95127 95241->95127 95242->95128 95243->95127 95244->95127 95246 73b01d ___scrt_fastfail 95245->95246 95247 73b094 95246->95247 95248 73b058 95246->95248 95252 6bb567 39 API calls 95247->95252 95254 73b08b 95247->95254 95366 6bb567 95248->95366 95250 73b063 95250->95254 95258 6bb567 39 API calls 95250->95258 95251 73b0ed 95336 6b7510 95251->95336 95253 73b0a5 95252->95253 95257 6bb567 39 API calls 95253->95257 95254->95251 95259 6bb567 39 API calls 95254->95259 95257->95254 95261 73b078 95258->95261 95259->95251 95263 6bb567 39 API calls 95261->95263 95262 73b115 95264 73b1d8 95262->95264 95265 73b11f 95262->95265 95263->95254 95267 73b20a GetCurrentDirectoryW 95264->95267 95270 6b7510 53 API calls 95264->95270 95266 6b7510 53 API calls 95265->95266 95268 73b130 95266->95268 95269 6cfe0b 22 API calls 95267->95269 95271 6b7620 22 API calls 95268->95271 95272 73b22f GetCurrentDirectoryW 95269->95272 95273 73b1ef 95270->95273 95274 73b13a 95271->95274 95275 73b23c 95272->95275 95276 6b7620 22 API calls 95273->95276 95278 6b7510 53 API calls 95274->95278 95280 73b275 95275->95280 95371 6b9c6e 22 API calls 95275->95371 95277 73b1f9 _wcslen 95276->95277 95277->95267 95277->95280 95279 73b14b 95278->95279 95281 6b7620 22 API calls 95279->95281 95285 73b287 95280->95285 95286 73b28b 95280->95286 95283 73b155 95281->95283 95287 6b7510 53 API calls 95283->95287 95284 73b255 95372 6b9c6e 22 API calls 95284->95372 95293 73b39a CreateProcessW 95285->95293 95294 73b2f8 95285->95294 95374 7207c0 10 API calls 95286->95374 95290 73b166 95287->95290 95295 6b7620 22 API calls 95290->95295 95291 73b265 95373 6b9c6e 22 API calls 95291->95373 95292 73b294 95375 7206e6 10 API calls 95292->95375 95335 73b32f _wcslen 95293->95335 95377 7111c8 39 API calls 95294->95377 95299 73b170 95295->95299 95300 73b1a6 GetSystemDirectoryW 95299->95300 95303 6b7510 53 API calls 95299->95303 95305 6cfe0b 22 API calls 95300->95305 95301 73b2aa 95376 7205a7 8 API calls 95301->95376 95302 73b2fd 95306 73b323 95302->95306 95307 73b32a 95302->95307 95309 73b187 95303->95309 95312 73b1cb GetSystemDirectoryW 95305->95312 95378 711201 128 API calls 2 library calls 95306->95378 95379 7114ce 6 API calls 95307->95379 95314 6b7620 22 API calls 95309->95314 95311 73b2d0 95311->95285 95312->95275 95313 73b328 95313->95335 95315 73b191 _wcslen 95314->95315 95315->95275 95315->95300 95316 73b3d6 GetLastError 95325 73b41a 95316->95325 95317 73b42f CloseHandle 95318 73b43f 95317->95318 95326 73b49a 95317->95326 95320 73b451 95318->95320 95321 73b446 CloseHandle 95318->95321 95323 73b463 95320->95323 95324 73b458 CloseHandle 95320->95324 95321->95320 95322 73b4a6 95322->95325 95327 73b475 95323->95327 95328 73b46a CloseHandle 95323->95328 95324->95323 95363 720175 95325->95363 95326->95322 95331 73b4d2 CloseHandle 95326->95331 95380 7209d9 34 API calls 95327->95380 95328->95327 95331->95325 95333 73b486 95381 73b536 25 API calls 95333->95381 95335->95316 95335->95317 95337 6b7525 95336->95337 95354 6b7522 95336->95354 95338 6b755b 95337->95338 95339 6b752d 95337->95339 95340 6f50f6 95338->95340 95343 6f500f 95338->95343 95344 6b756d 95338->95344 95382 6d51c6 26 API calls 95339->95382 95385 6d5183 26 API calls 95340->95385 95351 6f5088 95343->95351 95353 6cfe0b 22 API calls 95343->95353 95383 6cfb21 51 API calls 95344->95383 95345 6b753d 95348 6cfddb 22 API calls 95345->95348 95346 6f510e 95346->95346 95350 6b7547 95348->95350 95352 6b9cb3 22 API calls 95350->95352 95384 6cfb21 51 API calls 95351->95384 95352->95354 95355 6f5058 95353->95355 95359 6b7620 95354->95359 95356 6cfddb 22 API calls 95355->95356 95357 6f507f 95356->95357 95358 6b9cb3 22 API calls 95357->95358 95358->95351 95360 6b762a _wcslen 95359->95360 95361 6cfe0b 22 API calls 95360->95361 95362 6b763f 95361->95362 95362->95262 95386 72030f 95363->95386 95367 6bb57f 95366->95367 95368 6bb578 95366->95368 95367->95250 95368->95367 95399 6d62d1 39 API calls 95368->95399 95370 6bb5c2 95370->95250 95371->95284 95372->95291 95373->95280 95374->95292 95375->95301 95376->95311 95377->95302 95378->95313 95379->95335 95380->95333 95381->95326 95382->95345 95383->95345 95384->95340 95385->95346 95387 720321 CloseHandle 95386->95387 95388 720329 95386->95388 95387->95388 95389 720336 95388->95389 95390 72032e CloseHandle 95388->95390 95391 720343 95389->95391 95392 72033b CloseHandle 95389->95392 95390->95389 95393 720350 95391->95393 95394 720348 CloseHandle 95391->95394 95392->95391 95395 720355 CloseHandle 95393->95395 95396 72035d 95393->95396 95394->95393 95395->95396 95397 720362 CloseHandle 95396->95397 95398 72017d 95396->95398 95397->95398 95398->95208 95399->95370 95401 71dc06 95400->95401 95402 71dbdc GetFileAttributesW 95400->95402 95401->95217 95402->95401 95403 71dbe8 FindFirstFileW 95402->95403 95403->95401 95404 71dbf9 FindClose 95403->95404 95404->95401 95406 6baceb 23 API calls 95405->95406 95407 742af3 95406->95407 95408 742b1d 95407->95408 95409 742aff 95407->95409 95410 6b6b57 22 API calls 95408->95410 95411 6b7510 53 API calls 95409->95411 95413 742b1b 95410->95413 95412 742b0c 95411->95412 95412->95413 95415 6ba8c7 22 API calls __fread_nolock 95412->95415 95413->95220 95415->95413 95420 71df02 95416->95420 95417 71df19 95426 6d62fb 39 API calls 95417->95426 95420->95417 95421 71df1f 95420->95421 95425 6d63b2 GetStringTypeW _strftime 95420->95425 95421->95157 95422->95157 95423->95157 95424->95157 95425->95420 95426->95421 95427 6b1098 95432 6b42de 95427->95432 95431 6b10a7 95433 6ba961 22 API calls 95432->95433 95434 6b42f5 GetVersionExW 95433->95434 95435 6b6b57 22 API calls 95434->95435 95436 6b4342 95435->95436 95437 6b93b2 22 API calls 95436->95437 95446 6b4378 95436->95446 95438 6b436c 95437->95438 95440 6b37a0 22 API calls 95438->95440 95439 6b441b GetCurrentProcess IsWow64Process 95441 6b4437 95439->95441 95440->95446 95442 6b444f LoadLibraryA 95441->95442 95443 6f3824 GetSystemInfo 95441->95443 95444 6b449c GetSystemInfo 95442->95444 95445 6b4460 GetProcAddress 95442->95445 95449 6b4476 95444->95449 95445->95444 95448 6b4470 GetNativeSystemInfo 95445->95448 95446->95439 95447 6f37df 95446->95447 95448->95449 95450 6b447a FreeLibrary 95449->95450 95451 6b109d 95449->95451 95450->95451 95452 6d00a3 29 API calls __onexit 95451->95452 95452->95431 95453 6bf7bf 95454 6bf7d3 95453->95454 95455 6bfcb6 95453->95455 95457 6bfcc2 95454->95457 95458 6cfddb 22 API calls 95454->95458 95456 6baceb 23 API calls 95455->95456 95456->95457 95459 6baceb 23 API calls 95457->95459 95460 6bf7e5 95458->95460 95462 6bfd3d 95459->95462 95460->95457 95461 6bf83e 95460->95461 95460->95462 95464 6c1310 348 API calls 95461->95464 95487 6bed9d ISource 95461->95487 95490 721155 22 API calls 95462->95490 95485 6bec76 ISource 95464->95485 95466 6bfef7 95466->95487 95492 6ba8c7 22 API calls __fread_nolock 95466->95492 95467 6cfddb 22 API calls 95467->95485 95469 704b0b 95494 72359c 82 API calls __wsopen_s 95469->95494 95470 6ba8c7 22 API calls 95470->95485 95471 704600 95471->95487 95491 6ba8c7 22 API calls __fread_nolock 95471->95491 95477 6d0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95477->95485 95478 6bfbe3 95481 704bdc 95478->95481 95486 6bf3ae ISource 95478->95486 95478->95487 95479 6ba961 22 API calls 95479->95485 95480 6d00a3 29 API calls pre_c_initialization 95480->95485 95495 72359c 82 API calls __wsopen_s 95481->95495 95483 6d01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95483->95485 95484 704beb 95496 72359c 82 API calls __wsopen_s 95484->95496 95485->95466 95485->95467 95485->95469 95485->95470 95485->95471 95485->95477 95485->95478 95485->95479 95485->95480 95485->95483 95485->95484 95485->95486 95485->95487 95488 6c01e0 348 API calls 2 library calls 95485->95488 95489 6c06a0 41 API calls ISource 95485->95489 95486->95487 95493 72359c 82 API calls __wsopen_s 95486->95493 95488->95485 95489->95485 95490->95487 95491->95487 95492->95487 95493->95487 95494->95487 95495->95484 95496->95487 95497 6d03fb 95498 6d0407 ___scrt_is_nonwritable_in_current_image 95497->95498 95526 6cfeb1 95498->95526 95500 6d040e 95501 6d0561 95500->95501 95504 6d0438 95500->95504 95556 6d083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 95501->95556 95503 6d0568 95549 6d4e52 95503->95549 95513 6d0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 95504->95513 95537 6e247d 95504->95537 95511 6d0457 95517 6d04d8 95513->95517 95552 6d4e1a 38 API calls 3 library calls 95513->95552 95515 6d04de 95518 6d04f3 95515->95518 95545 6d0959 95517->95545 95553 6d0992 GetModuleHandleW 95518->95553 95520 6d04fa 95520->95503 95521 6d04fe 95520->95521 95522 6d0507 95521->95522 95554 6d4df5 28 API calls _abort 95521->95554 95555 6d0040 13 API calls 2 library calls 95522->95555 95525 6d050f 95525->95511 95527 6cfeba 95526->95527 95558 6d0698 IsProcessorFeaturePresent 95527->95558 95529 6cfec6 95559 6d2c94 10 API calls 3 library calls 95529->95559 95531 6cfecb 95536 6cfecf 95531->95536 95560 6e2317 95531->95560 95534 6cfee6 95534->95500 95536->95500 95538 6e2494 95537->95538 95539 6d0a8c CatchGuardHandler 5 API calls 95538->95539 95540 6d0451 95539->95540 95540->95511 95541 6e2421 95540->95541 95544 6e2450 95541->95544 95542 6d0a8c CatchGuardHandler 5 API calls 95543 6e2479 95542->95543 95543->95513 95544->95542 95611 6d2340 95545->95611 95548 6d097f 95548->95515 95613 6d4bcf 95549->95613 95552->95517 95553->95520 95554->95522 95555->95525 95556->95503 95558->95529 95559->95531 95564 6ed1f6 95560->95564 95563 6d2cbd 8 API calls 3 library calls 95563->95536 95567 6ed213 95564->95567 95568 6ed20f 95564->95568 95566 6cfed8 95566->95534 95566->95563 95567->95568 95570 6e4bfb 95567->95570 95582 6d0a8c 95568->95582 95571 6e4c07 ___scrt_is_nonwritable_in_current_image 95570->95571 95589 6e2f5e EnterCriticalSection 95571->95589 95573 6e4c0e 95590 6e50af 95573->95590 95575 6e4c1d 95580 6e4c2c 95575->95580 95603 6e4a8f 29 API calls 95575->95603 95578 6e4c27 95604 6e4b45 GetStdHandle GetFileType 95578->95604 95605 6e4c48 LeaveCriticalSection _abort 95580->95605 95581 6e4c3d __fread_nolock 95581->95567 95583 6d0a95 95582->95583 95584 6d0a97 IsProcessorFeaturePresent 95582->95584 95583->95566 95586 6d0c5d 95584->95586 95610 6d0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 95586->95610 95588 6d0d40 95588->95566 95589->95573 95591 6e50bb ___scrt_is_nonwritable_in_current_image 95590->95591 95592 6e50df 95591->95592 95593 6e50c8 95591->95593 95606 6e2f5e EnterCriticalSection 95592->95606 95607 6df2d9 20 API calls __dosmaperr 95593->95607 95596 6e50cd 95608 6e27ec 26 API calls __fread_nolock 95596->95608 95598 6e5117 95609 6e513e LeaveCriticalSection _abort 95598->95609 95599 6e50d7 __fread_nolock 95599->95575 95600 6e50eb 95600->95598 95602 6e5000 __wsopen_s 21 API calls 95600->95602 95602->95600 95603->95578 95604->95580 95605->95581 95606->95600 95607->95596 95608->95599 95609->95599 95610->95588 95612 6d096c GetStartupInfoW 95611->95612 95612->95548 95614 6d4bdb _unexpected 95613->95614 95615 6d4bf4 95614->95615 95616 6d4be2 95614->95616 95637 6e2f5e EnterCriticalSection 95615->95637 95652 6d4d29 GetModuleHandleW 95616->95652 95619 6d4bfb 95624 6d4c70 95619->95624 95635 6d4c99 95619->95635 95638 6e21a8 95619->95638 95620 6d4be7 95620->95615 95653 6d4d6d GetModuleHandleExW 95620->95653 95628 6d4c88 95624->95628 95629 6e2421 _abort 5 API calls 95624->95629 95626 6d4cb6 95644 6d4ce8 95626->95644 95627 6d4ce2 95661 6f1d29 5 API calls CatchGuardHandler 95627->95661 95630 6e2421 _abort 5 API calls 95628->95630 95629->95628 95630->95635 95641 6d4cd9 95635->95641 95637->95619 95662 6e1ee1 95638->95662 95681 6e2fa6 LeaveCriticalSection 95641->95681 95643 6d4cb2 95643->95626 95643->95627 95682 6e360c 95644->95682 95647 6d4d16 95650 6d4d6d _abort 8 API calls 95647->95650 95648 6d4cf6 GetPEB 95648->95647 95649 6d4d06 GetCurrentProcess TerminateProcess 95648->95649 95649->95647 95651 6d4d1e ExitProcess 95650->95651 95652->95620 95654 6d4dba 95653->95654 95655 6d4d97 GetProcAddress 95653->95655 95657 6d4dc9 95654->95657 95658 6d4dc0 FreeLibrary 95654->95658 95656 6d4dac 95655->95656 95656->95654 95659 6d0a8c CatchGuardHandler 5 API calls 95657->95659 95658->95657 95660 6d4bf3 95659->95660 95660->95615 95665 6e1e90 95662->95665 95664 6e1f05 95664->95624 95666 6e1e9c ___scrt_is_nonwritable_in_current_image 95665->95666 95673 6e2f5e EnterCriticalSection 95666->95673 95668 6e1eaa 95674 6e1f31 95668->95674 95672 6e1ec8 __fread_nolock 95672->95664 95673->95668 95677 6e1f59 95674->95677 95679 6e1f51 95674->95679 95675 6d0a8c CatchGuardHandler 5 API calls 95676 6e1eb7 95675->95676 95680 6e1ed5 LeaveCriticalSection _abort 95676->95680 95678 6e29c8 _free 20 API calls 95677->95678 95677->95679 95678->95679 95679->95675 95680->95672 95681->95643 95683 6e3627 95682->95683 95684 6e3631 95682->95684 95686 6d0a8c CatchGuardHandler 5 API calls 95683->95686 95689 6e2fd7 5 API calls 2 library calls 95684->95689 95687 6d4cf2 95686->95687 95687->95647 95687->95648 95688 6e3648 95688->95683 95689->95688 95690 6bdefc 95693 6b1d6f 95690->95693 95692 6bdf07 95694 6b1d8c 95693->95694 95695 6b1f6f 348 API calls 95694->95695 95696 6b1da6 95695->95696 95697 6f2759 95696->95697 95699 6b1e36 95696->95699 95700 6b1dc2 95696->95700 95703 72359c 82 API calls __wsopen_s 95697->95703 95699->95692 95700->95699 95702 6b289a 23 API calls 95700->95702 95702->95699 95703->95699 95704 6bdddc 95705 6bb710 348 API calls 95704->95705 95706 6bddea 95705->95706 95707 6bfe73 95708 6cceb1 23 API calls 95707->95708 95709 6bfe89 95708->95709 95714 6ccf92 95709->95714 95711 6bfeb3 95726 72359c 82 API calls __wsopen_s 95711->95726 95713 704ab8 95715 6b6270 22 API calls 95714->95715 95716 6ccfc9 95715->95716 95717 6b9cb3 22 API calls 95716->95717 95719 6ccffa 95716->95719 95718 70d166 95717->95718 95727 6b6350 22 API calls 95718->95727 95719->95711 95721 70d171 95728 6cd2f0 40 API calls 95721->95728 95723 70d184 95724 70d188 95723->95724 95725 6baceb 23 API calls 95723->95725 95725->95724 95726->95713 95727->95721 95728->95723 95729 6b1033 95734 6b4c91 95729->95734 95733 6b1042 95735 6ba961 22 API calls 95734->95735 95736 6b4cff 95735->95736 95742 6b3af0 95736->95742 95739 6b4d9c 95740 6b1038 95739->95740 95745 6b51f7 22 API calls __fread_nolock 95739->95745 95741 6d00a3 29 API calls __onexit 95740->95741 95741->95733 95746 6b3b1c 95742->95746 95745->95739 95747 6b3b0f 95746->95747 95748 6b3b29 95746->95748 95747->95739 95748->95747 95749 6b3b30 RegOpenKeyExW 95748->95749 95749->95747 95750 6b3b4a RegQueryValueExW 95749->95750 95751 6b3b80 RegCloseKey 95750->95751 95752 6b3b6b 95750->95752 95751->95747 95752->95751 95753 6b2e37 95754 6ba961 22 API calls 95753->95754 95755 6b2e4d 95754->95755 95832 6b4ae3 95755->95832 95757 6b2e6b 95758 6b3a5a 24 API calls 95757->95758 95759 6b2e7f 95758->95759 95760 6b9cb3 22 API calls 95759->95760 95761 6b2e8c 95760->95761 95762 6b4ecb 94 API calls 95761->95762 95763 6b2ea5 95762->95763 95764 6b2ead 95763->95764 95765 6f2cb0 95763->95765 95846 6ba8c7 22 API calls __fread_nolock 95764->95846 95766 722cf9 80 API calls 95765->95766 95767 6f2cc3 95766->95767 95769 6f2ccf 95767->95769 95771 6b4f39 68 API calls 95767->95771 95773 6b4f39 68 API calls 95769->95773 95770 6b2ec3 95847 6b6f88 22 API calls 95770->95847 95771->95769 95775 6f2ce5 95773->95775 95774 6b2ecf 95776 6b9cb3 22 API calls 95774->95776 95864 6b3084 22 API calls 95775->95864 95777 6b2edc 95776->95777 95848 6ba81b 41 API calls 95777->95848 95780 6b2eec 95782 6b9cb3 22 API calls 95780->95782 95781 6f2d02 95865 6b3084 22 API calls 95781->95865 95784 6b2f12 95782->95784 95849 6ba81b 41 API calls 95784->95849 95785 6f2d1e 95787 6b3a5a 24 API calls 95785->95787 95789 6f2d44 95787->95789 95788 6b2f21 95792 6ba961 22 API calls 95788->95792 95866 6b3084 22 API calls 95789->95866 95791 6f2d50 95867 6ba8c7 22 API calls __fread_nolock 95791->95867 95794 6b2f3f 95792->95794 95850 6b3084 22 API calls 95794->95850 95795 6f2d5e 95868 6b3084 22 API calls 95795->95868 95798 6b2f4b 95851 6d4a28 40 API calls 3 library calls 95798->95851 95799 6f2d6d 95869 6ba8c7 22 API calls __fread_nolock 95799->95869 95801 6b2f59 95801->95775 95802 6b2f63 95801->95802 95852 6d4a28 40 API calls 3 library calls 95802->95852 95805 6f2d83 95870 6b3084 22 API calls 95805->95870 95806 6b2f6e 95806->95781 95808 6b2f78 95806->95808 95853 6d4a28 40 API calls 3 library calls 95808->95853 95809 6f2d90 95811 6b2f83 95811->95785 95812 6b2f8d 95811->95812 95854 6d4a28 40 API calls 3 library calls 95812->95854 95814 6b2f98 95815 6b2fdc 95814->95815 95855 6b3084 22 API calls 95814->95855 95815->95799 95816 6b2fe8 95815->95816 95816->95809 95858 6b63eb 22 API calls 95816->95858 95818 6b2fbf 95856 6ba8c7 22 API calls __fread_nolock 95818->95856 95820 6b2ff8 95859 6b6a50 22 API calls 95820->95859 95823 6b2fcd 95857 6b3084 22 API calls 95823->95857 95824 6b3006 95860 6b70b0 23 API calls 95824->95860 95827 6b3021 95830 6b3065 95827->95830 95861 6b6f88 22 API calls 95827->95861 95862 6b70b0 23 API calls 95827->95862 95863 6b3084 22 API calls 95827->95863 95833 6b4af0 __wsopen_s 95832->95833 95834 6b6b57 22 API calls 95833->95834 95835 6b4b22 95833->95835 95834->95835 95842 6b4b58 95835->95842 95871 6b4c6d 95835->95871 95837 6b4c29 95838 6b9cb3 22 API calls 95837->95838 95845 6b4c5e 95837->95845 95840 6b4c52 95838->95840 95839 6b9cb3 22 API calls 95839->95842 95843 6b515f 22 API calls 95840->95843 95841 6b4c6d 22 API calls 95841->95842 95842->95837 95842->95839 95842->95841 95844 6b515f 22 API calls 95842->95844 95843->95845 95844->95842 95845->95757 95846->95770 95847->95774 95848->95780 95849->95788 95850->95798 95851->95801 95852->95806 95853->95811 95854->95814 95855->95818 95856->95823 95857->95815 95858->95820 95859->95824 95860->95827 95861->95827 95862->95827 95863->95827 95864->95781 95865->95785 95866->95791 95867->95795 95868->95799 95869->95805 95870->95809 95872 6baec9 22 API calls 95871->95872 95873 6b4c78 95872->95873 95873->95835 95874 6b3156 95877 6b3170 95874->95877 95878 6b3187 95877->95878 95879 6b31eb 95878->95879 95880 6b318c 95878->95880 95917 6b31e9 95878->95917 95881 6f2dfb 95879->95881 95882 6b31f1 95879->95882 95883 6b3199 95880->95883 95884 6b3265 PostQuitMessage 95880->95884 95932 6b18e2 10 API calls 95881->95932 95886 6b31f8 95882->95886 95887 6b321d SetTimer RegisterWindowMessageW 95882->95887 95889 6f2e7c 95883->95889 95890 6b31a4 95883->95890 95891 6b316a 95884->95891 95885 6b31d0 DefWindowProcW 95885->95891 95892 6f2d9c 95886->95892 95893 6b3201 KillTimer 95886->95893 95887->95891 95895 6b3246 CreatePopupMenu 95887->95895 95935 71bf30 34 API calls ___scrt_fastfail 95889->95935 95896 6b31ae 95890->95896 95897 6f2e68 95890->95897 95905 6f2dd7 MoveWindow 95892->95905 95906 6f2da1 95892->95906 95899 6b30f2 Shell_NotifyIconW 95893->95899 95894 6f2e1c 95933 6ce499 42 API calls 95894->95933 95895->95891 95902 6f2e4d 95896->95902 95903 6b31b9 95896->95903 95922 71c161 95897->95922 95907 6b3214 95899->95907 95902->95885 95934 710ad7 22 API calls 95902->95934 95908 6b31c4 95903->95908 95909 6b3253 95903->95909 95904 6f2e8e 95904->95885 95904->95891 95905->95891 95910 6f2da7 95906->95910 95911 6f2dc6 SetFocus 95906->95911 95929 6b3c50 DeleteObject DestroyWindow 95907->95929 95908->95885 95919 6b30f2 Shell_NotifyIconW 95908->95919 95930 6b326f 44 API calls ___scrt_fastfail 95909->95930 95910->95908 95912 6f2db0 95910->95912 95911->95891 95931 6b18e2 10 API calls 95912->95931 95917->95885 95918 6b3263 95918->95891 95920 6f2e41 95919->95920 95921 6b3837 49 API calls 95920->95921 95921->95917 95923 71c276 95922->95923 95924 71c179 ___scrt_fastfail 95922->95924 95923->95891 95925 6b3923 24 API calls 95924->95925 95927 71c1a0 95925->95927 95926 71c25f KillTimer SetTimer 95926->95923 95927->95926 95928 71c251 Shell_NotifyIconW 95927->95928 95928->95926 95929->95891 95930->95918 95931->95891 95932->95894 95933->95908 95934->95917 95935->95904

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 392 6b42de-6b434d call 6ba961 GetVersionExW call 6b6b57 397 6f3617-6f362a 392->397 398 6b4353 392->398 400 6f362b-6f362f 397->400 399 6b4355-6b4357 398->399 401 6b435d-6b43bc call 6b93b2 call 6b37a0 399->401 402 6f3656 399->402 403 6f3632-6f363e 400->403 404 6f3631 400->404 421 6f37df-6f37e6 401->421 422 6b43c2-6b43c4 401->422 407 6f365d-6f3660 402->407 403->400 406 6f3640-6f3642 403->406 404->403 406->399 409 6f3648-6f364f 406->409 411 6b441b-6b4435 GetCurrentProcess IsWow64Process 407->411 412 6f3666-6f36a8 407->412 409->397 410 6f3651 409->410 410->402 414 6b4437 411->414 415 6b4494-6b449a 411->415 412->411 416 6f36ae-6f36b1 412->416 418 6b443d-6b4449 414->418 415->418 419 6f36db-6f36e5 416->419 420 6f36b3-6f36bd 416->420 423 6b444f-6b445e LoadLibraryA 418->423 424 6f3824-6f3828 GetSystemInfo 418->424 428 6f36f8-6f3702 419->428 429 6f36e7-6f36f3 419->429 425 6f36bf-6f36c5 420->425 426 6f36ca-6f36d6 420->426 430 6f37e8 421->430 431 6f3806-6f3809 421->431 422->407 427 6b43ca-6b43dd 422->427 434 6b449c-6b44a6 GetSystemInfo 423->434 435 6b4460-6b446e GetProcAddress 423->435 425->411 426->411 436 6b43e3-6b43e5 427->436 437 6f3726-6f372f 427->437 439 6f3715-6f3721 428->439 440 6f3704-6f3710 428->440 429->411 438 6f37ee 430->438 432 6f380b-6f381a 431->432 433 6f37f4-6f37fc 431->433 432->438 443 6f381c-6f3822 432->443 433->431 445 6b4476-6b4478 434->445 435->434 444 6b4470-6b4474 GetNativeSystemInfo 435->444 446 6b43eb-6b43ee 436->446 447 6f374d-6f3762 436->447 441 6f373c-6f3748 437->441 442 6f3731-6f3737 437->442 438->433 439->411 440->411 441->411 442->411 443->433 444->445 450 6b447a-6b447b FreeLibrary 445->450 451 6b4481-6b4493 445->451 452 6f3791-6f3794 446->452 453 6b43f4-6b440f 446->453 448 6f376f-6f377b 447->448 449 6f3764-6f376a 447->449 448->411 449->411 450->451 452->411 454 6f379a-6f37c1 452->454 455 6b4415 453->455 456 6f3780-6f378c 453->456 457 6f37ce-6f37da 454->457 458 6f37c3-6f37c9 454->458 455->411 456->411 457->411 458->411
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetVersionExW.KERNEL32(?), ref: 006B430D
                                                                                                                                                                                                                                                        • Part of subcall function 006B6B57: _wcslen.LIBCMT ref: 006B6B6A
                                                                                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(?,0074CB64,00000000,?,?), ref: 006B4422
                                                                                                                                                                                                                                                      • IsWow64Process.KERNEL32(00000000,?,?), ref: 006B4429
                                                                                                                                                                                                                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 006B4454
                                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 006B4466
                                                                                                                                                                                                                                                      • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 006B4474
                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000,?,?), ref: 006B447B
                                                                                                                                                                                                                                                      • GetSystemInfo.KERNEL32(?,?,?), ref: 006B44A0
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                                                                                                                                                                                                      • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                                                                                                                                                                                                      • API String ID: 3290436268-3101561225
                                                                                                                                                                                                                                                      • Opcode ID: 9fd2830633a8d82ce32e72ced70680dd23a5e5652f6b506b8dc61b8c98d0436d
                                                                                                                                                                                                                                                      • Instruction ID: 16031b828e3107327bbc0885d27cbe7bd544349ba7e0669adce6551253ec0373
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9fd2830633a8d82ce32e72ced70680dd23a5e5652f6b506b8dc61b8c98d0436d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3FA1D4B198A2D4CFC712C7697C441E53FEEAB26710BA8C899D08193F22D66C455BCB2D

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 1003 6b42a2-6b42ba CreateStreamOnHGlobal 1004 6b42da-6b42dd 1003->1004 1005 6b42bc-6b42d3 FindResourceExW 1003->1005 1006 6b42d9 1005->1006 1007 6f35ba-6f35c9 LoadResource 1005->1007 1006->1004 1007->1006 1008 6f35cf-6f35dd SizeofResource 1007->1008 1008->1006 1009 6f35e3-6f35ee LockResource 1008->1009 1009->1006 1010 6f35f4-6f3612 1009->1010 1010->1006
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,006B50AA,?,?,00000000,00000000), ref: 006B42B2
                                                                                                                                                                                                                                                      • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,006B50AA,?,?,00000000,00000000), ref: 006B42C9
                                                                                                                                                                                                                                                      • LoadResource.KERNEL32(?,00000000,?,?,006B50AA,?,?,00000000,00000000,?,?,?,?,?,?,006B4F20), ref: 006F35BE
                                                                                                                                                                                                                                                      • SizeofResource.KERNEL32(?,00000000,?,?,006B50AA,?,?,00000000,00000000,?,?,?,?,?,?,006B4F20), ref: 006F35D3
                                                                                                                                                                                                                                                      • LockResource.KERNEL32(006B50AA,?,?,006B50AA,?,?,00000000,00000000,?,?,?,?,?,?,006B4F20,?), ref: 006F35E6
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                                                                                                                                                                                      • String ID: SCRIPT
                                                                                                                                                                                                                                                      • API String ID: 3051347437-3967369404
                                                                                                                                                                                                                                                      • Opcode ID: f9641314ecb6488ff0cc594e947cabd7590d7bc247bf291a3de271d77ce8867c
                                                                                                                                                                                                                                                      • Instruction ID: cecb0b362aa3d7923aced2dcd6ed26a2d990bd7d566a7107d5373eda76381caf
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f9641314ecb6488ff0cc594e947cabd7590d7bc247bf291a3de271d77ce8867c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4E117CB4241700BFE7228FA5DC49FA77BBAEFC6B51F10816AF40296260DBB1D9409620

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 006B2B6B
                                                                                                                                                                                                                                                        • Part of subcall function 006B3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00781418,?,006B2E7F,?,?,?,00000000), ref: 006B3A78
                                                                                                                                                                                                                                                        • Part of subcall function 006B9CB3: _wcslen.LIBCMT ref: 006B9CBD
                                                                                                                                                                                                                                                      • GetForegroundWindow.USER32(runas,?,?,?,?,?,00772224), ref: 006F2C10
                                                                                                                                                                                                                                                      • ShellExecuteW.SHELL32(00000000,?,?,00772224), ref: 006F2C17
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                                                                                                                                                                                                                      • String ID: runas
                                                                                                                                                                                                                                                      • API String ID: 448630720-4000483414
                                                                                                                                                                                                                                                      • Opcode ID: 7d69b9e82f6619a115ecbbe9fd4127512155c2d32f48e0c6eb2fdf923c97349a
                                                                                                                                                                                                                                                      • Instruction ID: aaac759b80fdb9967bed73fbd3cedb7193c15322a4e683dedcefefb9a2da4315
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7d69b9e82f6619a115ecbbe9fd4127512155c2d32f48e0c6eb2fdf923c97349a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C51106B12083866AC785FF60D8619FE7BEA9F91344F44542DF246021A3CF2485CAC71A

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 1449 71d4dc-71d524 CreateToolhelp32Snapshot Process32FirstW call 71def7 1452 71d5d2-71d5d5 1449->1452 1453 71d529-71d538 Process32NextW 1452->1453 1454 71d5db-71d5ea CloseHandle 1452->1454 1453->1454 1455 71d53e-71d5ad call 6ba961 * 2 call 6b9cb3 call 6b525f call 6b988f call 6b6350 call 6cce60 1453->1455 1470 71d5b7-71d5be 1455->1470 1471 71d5af-71d5b1 1455->1471 1472 71d5c0-71d5cd call 6b988f * 2 1470->1472 1471->1472 1473 71d5b3-71d5b5 1471->1473 1472->1452 1473->1470 1473->1472
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 0071D501
                                                                                                                                                                                                                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 0071D50F
                                                                                                                                                                                                                                                      • Process32NextW.KERNEL32(00000000,?), ref: 0071D52F
                                                                                                                                                                                                                                                      • CloseHandle.KERNELBASE(00000000), ref: 0071D5DC
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 420147892-0
                                                                                                                                                                                                                                                      • Opcode ID: a62e8e16ec11e9208a3b10c695582d72f50c74635fd9cb975f6f11cb533eafca
                                                                                                                                                                                                                                                      • Instruction ID: 6a559e2db345d350387bf077ffa6628df695057c2fe53405fb24934cddfa0914
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a62e8e16ec11e9208a3b10c695582d72f50c74635fd9cb975f6f11cb533eafca
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2831C4B11083009FD315EF54C881AEFBBF9EF99354F14092DF681821A1EB719984CBA2

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 1477 71dbbe-71dbda lstrlenW 1478 71dc06 1477->1478 1479 71dbdc-71dbe6 GetFileAttributesW 1477->1479 1480 71dc09-71dc0d 1478->1480 1479->1480 1481 71dbe8-71dbf7 FindFirstFileW 1479->1481 1481->1478 1482 71dbf9-71dc04 FindClose 1481->1482 1482->1480
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(?,006F5222), ref: 0071DBCE
                                                                                                                                                                                                                                                      • GetFileAttributesW.KERNELBASE(?), ref: 0071DBDD
                                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 0071DBEE
                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 0071DBFA
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2695905019-0
                                                                                                                                                                                                                                                      • Opcode ID: c3abbd9f8df9d873998628639edf95421ff024ccf64c1bf6080c24917f9bcefe
                                                                                                                                                                                                                                                      • Instruction ID: 960b6d2ce1c208f7dcba7b3dc8fdd86dc4514d7714b014d94498296892482b28
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c3abbd9f8df9d873998628639edf95421ff024ccf64c1bf6080c24917f9bcefe
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2CF082344119149B93316F6C9C0D4EA376CAE02334B108B02F535C10E0EBF85D94C9E9
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(006E28E9,?,006D4CBE,006E28E9,007788B8,0000000C,006D4E15,006E28E9,00000002,00000000,?,006E28E9), ref: 006D4D09
                                                                                                                                                                                                                                                      • TerminateProcess.KERNEL32(00000000,?,006D4CBE,006E28E9,007788B8,0000000C,006D4E15,006E28E9,00000002,00000000,?,006E28E9), ref: 006D4D10
                                                                                                                                                                                                                                                      • ExitProcess.KERNEL32 ref: 006D4D22
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Process$CurrentExitTerminate
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1703294689-0
                                                                                                                                                                                                                                                      • Opcode ID: 5da1061113eedea3b9cbb25d1dd4b170d64adb50e3e28d0b2b78fab68f99687a
                                                                                                                                                                                                                                                      • Instruction ID: 215a9a542e8dcc2a0f104a2afa83651b7878b45dd8948795e0aa6d3ae9d64911
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5da1061113eedea3b9cbb25d1dd4b170d64adb50e3e28d0b2b78fab68f99687a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 84E0BF35401148ABCF626F54DD09A583B6BEF42741B148019FC058B322DB39DD41CA84
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: BuffCharUpper
                                                                                                                                                                                                                                                      • String ID: p#x
                                                                                                                                                                                                                                                      • API String ID: 3964851224-1271349037
                                                                                                                                                                                                                                                      • Opcode ID: 8d74e21f77f780f0ac8eefdf43b0974196d511505779465141e79de2914a286d
                                                                                                                                                                                                                                                      • Instruction ID: c6a201b750ecfa36bbce1eac1a249f0c6bbfeb298d9d2a0d018262c2864c30fe
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8d74e21f77f780f0ac8eefdf43b0974196d511505779465141e79de2914a286d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 66A26EB0608341DFD750DF18C480B6AB7E2BF89324F14896DE89A8B352D775ED85CB92

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 0 73aff9-73b056 call 6d2340 3 73b094-73b098 0->3 4 73b058-73b06b call 6bb567 0->4 6 73b09a-73b0bb call 6bb567 * 2 3->6 7 73b0dd-73b0e0 3->7 13 73b0c8 4->13 14 73b06d-73b092 call 6bb567 * 2 4->14 29 73b0bf-73b0c4 6->29 9 73b0e2-73b0e5 7->9 10 73b0f5-73b119 call 6b7510 call 6b7620 7->10 15 73b0e8-73b0ed call 6bb567 9->15 31 73b1d8-73b1e0 10->31 32 73b11f-73b178 call 6b7510 call 6b7620 call 6b7510 call 6b7620 call 6b7510 call 6b7620 10->32 19 73b0cb-73b0cf 13->19 14->29 15->10 24 73b0d1-73b0d7 19->24 25 73b0d9-73b0db 19->25 24->15 25->7 25->10 29->7 33 73b0c6 29->33 36 73b1e2-73b1fd call 6b7510 call 6b7620 31->36 37 73b20a-73b238 GetCurrentDirectoryW call 6cfe0b GetCurrentDirectoryW 31->37 79 73b1a6-73b1d6 GetSystemDirectoryW call 6cfe0b GetSystemDirectoryW 32->79 80 73b17a-73b195 call 6b7510 call 6b7620 32->80 33->19 36->37 50 73b1ff-73b208 call 6d4963 36->50 45 73b23c 37->45 49 73b240-73b244 45->49 52 73b246-73b270 call 6b9c6e * 3 49->52 53 73b275-73b285 call 7200d9 49->53 50->37 50->53 52->53 62 73b287-73b289 53->62 63 73b28b-73b2e1 call 7207c0 call 7206e6 call 7205a7 53->63 66 73b2ee-73b2f2 62->66 63->66 99 73b2e3 63->99 71 73b39a-73b3be CreateProcessW 66->71 72 73b2f8-73b321 call 7111c8 66->72 76 73b3c1-73b3d4 call 6cfe14 * 2 71->76 88 73b323-73b328 call 711201 72->88 89 73b32a call 7114ce 72->89 103 73b3d6-73b3e8 76->103 104 73b42f-73b43d CloseHandle 76->104 79->45 80->79 105 73b197-73b1a0 call 6d4963 80->105 98 73b32f-73b33c call 6d4963 88->98 89->98 115 73b347-73b357 call 6d4963 98->115 116 73b33e-73b345 98->116 99->66 109 73b3ea 103->109 110 73b3ed-73b3fc 103->110 107 73b43f-73b444 104->107 108 73b49c 104->108 105->49 105->79 117 73b451-73b456 107->117 118 73b446-73b44c CloseHandle 107->118 113 73b4a0-73b4a4 108->113 109->110 111 73b401-73b42a GetLastError call 6b630c call 6bcfa0 110->111 112 73b3fe 110->112 127 73b4e5-73b4f6 call 720175 111->127 112->111 120 73b4b2-73b4bc 113->120 121 73b4a6-73b4b0 113->121 136 73b362-73b372 call 6d4963 115->136 137 73b359-73b360 115->137 116->115 116->116 124 73b463-73b468 117->124 125 73b458-73b45e CloseHandle 117->125 118->117 128 73b4c4-73b4e3 call 6bcfa0 CloseHandle 120->128 129 73b4be 120->129 121->127 131 73b475-73b49a call 7209d9 call 73b536 124->131 132 73b46a-73b470 CloseHandle 124->132 125->124 128->127 129->128 131->113 132->131 147 73b374-73b37b 136->147 148 73b37d-73b398 call 6cfe14 * 3 136->148 137->136 137->137 147->147 147->148 148->76
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 0073B198
                                                                                                                                                                                                                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0073B1B0
                                                                                                                                                                                                                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0073B1D4
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 0073B200
                                                                                                                                                                                                                                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0073B214
                                                                                                                                                                                                                                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0073B236
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 0073B332
                                                                                                                                                                                                                                                        • Part of subcall function 007205A7: GetStdHandle.KERNEL32(000000F6), ref: 007205C6
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 0073B34B
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 0073B366
                                                                                                                                                                                                                                                      • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0073B3B6
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(00000000), ref: 0073B407
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 0073B439
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 0073B44A
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 0073B45C
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 0073B46E
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 0073B4E3
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2178637699-0
                                                                                                                                                                                                                                                      • Opcode ID: 5b993ba84b89c743b3d2018038a3405d4a1b4f8e92725f05e38b9715835be205
                                                                                                                                                                                                                                                      • Instruction ID: 3e1a592663a12bf97819c23ba8f2a5acbe6499be3ffd5809fbca639b9c950735
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5b993ba84b89c743b3d2018038a3405d4a1b4f8e92725f05e38b9715835be205
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0DF1BC71608340DFD764EF24C891B6EBBE6AF85310F14855DF9898B2A2DB35EC40CB96
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: InputSleepStateTimetime
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 4149333218-0
                                                                                                                                                                                                                                                      • Opcode ID: 22032a7a3d1242752cbf7dd1a240de071f1faa9f83a615e8a742864480d47c23
                                                                                                                                                                                                                                                      • Instruction ID: c016dd2bdfd027a4c2bb878ecacd96ac33174097452fa3e52e1717a8bb9bac0b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 22032a7a3d1242752cbf7dd1a240de071f1faa9f83a615e8a742864480d47c23
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DF4234B0604241EFD728DF24C848BEAB7E2BF45304F54861DE8558B3D2E778E885CB92

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetSysColorBrush.USER32(0000000F), ref: 006B2D07
                                                                                                                                                                                                                                                      • RegisterClassExW.USER32(00000030), ref: 006B2D31
                                                                                                                                                                                                                                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 006B2D42
                                                                                                                                                                                                                                                      • InitCommonControlsEx.COMCTL32(?), ref: 006B2D5F
                                                                                                                                                                                                                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 006B2D6F
                                                                                                                                                                                                                                                      • LoadIconW.USER32(000000A9), ref: 006B2D85
                                                                                                                                                                                                                                                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 006B2D94
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                                                                                                                                                                                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                                                                                                                                                                                      • API String ID: 2914291525-1005189915
                                                                                                                                                                                                                                                      • Opcode ID: 2baf5da3db4e3c5382812f64d0987664eb5cfdf2daa4e5d4c55cae1a93ca6cdd
                                                                                                                                                                                                                                                      • Instruction ID: 673152e5dc39dc034613f64711aaa469f35cba52298d9511c80bbe3f9ba298b0
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2baf5da3db4e3c5382812f64d0987664eb5cfdf2daa4e5d4c55cae1a93ca6cdd
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0621F2B5942348AFDB41DFA4EC89BDDBBB8FB09700F10811AF511A62A0D7B91541CFA8

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 460 6f065b-6f068b call 6f042f 463 6f068d-6f0698 call 6df2c6 460->463 464 6f06a6-6f06b2 call 6e5221 460->464 471 6f069a-6f06a1 call 6df2d9 463->471 469 6f06cb-6f0714 call 6f039a 464->469 470 6f06b4-6f06c9 call 6df2c6 call 6df2d9 464->470 480 6f0716-6f071f 469->480 481 6f0781-6f078a GetFileType 469->481 470->471 478 6f097d-6f0983 471->478 485 6f0756-6f077c GetLastError call 6df2a3 480->485 486 6f0721-6f0725 480->486 482 6f078c-6f07bd GetLastError call 6df2a3 CloseHandle 481->482 483 6f07d3-6f07d6 481->483 482->471 497 6f07c3-6f07ce call 6df2d9 482->497 489 6f07df-6f07e5 483->489 490 6f07d8-6f07dd 483->490 485->471 486->485 491 6f0727-6f0754 call 6f039a 486->491 494 6f07e9-6f0837 call 6e516a 489->494 495 6f07e7 489->495 490->494 491->481 491->485 502 6f0839-6f0845 call 6f05ab 494->502 503 6f0847-6f086b call 6f014d 494->503 495->494 497->471 502->503 509 6f086f-6f0879 call 6e86ae 502->509 510 6f087e-6f08c1 503->510 511 6f086d 503->511 509->478 513 6f08c3-6f08c7 510->513 514 6f08e2-6f08f0 510->514 511->509 513->514 516 6f08c9-6f08dd 513->516 517 6f097b 514->517 518 6f08f6-6f08fa 514->518 516->514 517->478 518->517 519 6f08fc-6f092f CloseHandle call 6f039a 518->519 522 6f0963-6f0977 519->522 523 6f0931-6f095d GetLastError call 6df2a3 call 6e5333 519->523 522->517 523->522
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006F039A: CreateFileW.KERNELBASE(00000000,00000000,?,006F0704,?,?,00000000,?,006F0704,00000000,0000000C), ref: 006F03B7
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 006F076F
                                                                                                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 006F0776
                                                                                                                                                                                                                                                      • GetFileType.KERNELBASE(00000000), ref: 006F0782
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 006F078C
                                                                                                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 006F0795
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 006F07B5
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 006F08FF
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 006F0931
                                                                                                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 006F0938
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                                                                                                                                                                      • String ID: H
                                                                                                                                                                                                                                                      • API String ID: 4237864984-2852464175
                                                                                                                                                                                                                                                      • Opcode ID: 5540c7a0161db3c14f5ef8236e18c5388b34d9f8bfcb678a057269fb8b24652b
                                                                                                                                                                                                                                                      • Instruction ID: d0b9bdec117b00cbe3b6c0474cc0a3d2b8e13c88fdfda757f13f16eecb8c37c3
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5540c7a0161db3c14f5ef8236e18c5388b34d9f8bfcb678a057269fb8b24652b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4DA12536A001088FEF19AF68D851BBE7BA2AF06320F24415EF915DF392D7359912CB95

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006B3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00781418,?,006B2E7F,?,?,?,00000000), ref: 006B3A78
                                                                                                                                                                                                                                                        • Part of subcall function 006B3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 006B3379
                                                                                                                                                                                                                                                      • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 006B356A
                                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 006F318D
                                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 006F31CE
                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 006F3210
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 006F3277
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 006F3286
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                                                                                                                                                                                                      • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                                                                                                                                                                                      • API String ID: 98802146-2727554177
                                                                                                                                                                                                                                                      • Opcode ID: 11b04769126e92d5e0cdab3f342d5cda7d0863ffbc419d86daf207d47cbd042c
                                                                                                                                                                                                                                                      • Instruction ID: 2dedb7c9be425cf35d5826f5731567d70f9018aa14db0b3bec2b48c33628a20c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 11b04769126e92d5e0cdab3f342d5cda7d0863ffbc419d86daf207d47cbd042c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CD71E4B15443009FC344EF65DC919ABBBE9FF85340F60842EF54583272EB389A49CB69

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetSysColorBrush.USER32(0000000F), ref: 006B2B8E
                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 006B2B9D
                                                                                                                                                                                                                                                      • LoadIconW.USER32(00000063), ref: 006B2BB3
                                                                                                                                                                                                                                                      • LoadIconW.USER32(000000A4), ref: 006B2BC5
                                                                                                                                                                                                                                                      • LoadIconW.USER32(000000A2), ref: 006B2BD7
                                                                                                                                                                                                                                                      • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 006B2BEF
                                                                                                                                                                                                                                                      • RegisterClassExW.USER32(?), ref: 006B2C40
                                                                                                                                                                                                                                                        • Part of subcall function 006B2CD4: GetSysColorBrush.USER32(0000000F), ref: 006B2D07
                                                                                                                                                                                                                                                        • Part of subcall function 006B2CD4: RegisterClassExW.USER32(00000030), ref: 006B2D31
                                                                                                                                                                                                                                                        • Part of subcall function 006B2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 006B2D42
                                                                                                                                                                                                                                                        • Part of subcall function 006B2CD4: InitCommonControlsEx.COMCTL32(?), ref: 006B2D5F
                                                                                                                                                                                                                                                        • Part of subcall function 006B2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 006B2D6F
                                                                                                                                                                                                                                                        • Part of subcall function 006B2CD4: LoadIconW.USER32(000000A9), ref: 006B2D85
                                                                                                                                                                                                                                                        • Part of subcall function 006B2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 006B2D94
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                                                                                                                                                                                      • String ID: #$0$AutoIt v3
                                                                                                                                                                                                                                                      • API String ID: 423443420-4155596026
                                                                                                                                                                                                                                                      • Opcode ID: 4b4a7130c918dc98023b5de78af86d3c3b1c02f9a2733a9f32067dab64104f34
                                                                                                                                                                                                                                                      • Instruction ID: a6ff2f6189c2f82676fdfffbe715e0b9d73840badad906fc03e52d20522b7730
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4b4a7130c918dc98023b5de78af86d3c3b1c02f9a2733a9f32067dab64104f34
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 28214C74E81314ABDB119FA5EC55ADD7FB8FB08B50F60801AE500E6AA0D3B90541CF98
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • __Init_thread_footer.LIBCMT ref: 006BBB4E
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Init_thread_footer
                                                                                                                                                                                                                                                      • String ID: p#x$p#x$p#x$p#x$p%x$p%x$x#x$x#x
                                                                                                                                                                                                                                                      • API String ID: 1385522511-4033257530
                                                                                                                                                                                                                                                      • Opcode ID: 7ae9b0f8f4a9d1c3bd2e296e328a4259e9646d4cb34682faad36d19bc92f237b
                                                                                                                                                                                                                                                      • Instruction ID: 72c75069bc41b410a09c6d65c4575a5d738a57704041b71f529c1c7d43b77605
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7ae9b0f8f4a9d1c3bd2e296e328a4259e9646d4cb34682faad36d19bc92f237b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DD326AB4A00209DFDB14DF54C894BFEB7F6EB45314F148169E905AB391C7B8AD82CB91

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 808 6b3170-6b3185 809 6b3187-6b318a 808->809 810 6b31e5-6b31e7 808->810 811 6b31eb 809->811 812 6b318c-6b3193 809->812 810->809 813 6b31e9 810->813 814 6f2dfb-6f2e23 call 6b18e2 call 6ce499 811->814 815 6b31f1-6b31f6 811->815 816 6b3199-6b319e 812->816 817 6b3265-6b326d PostQuitMessage 812->817 818 6b31d0-6b31d8 DefWindowProcW 813->818 854 6f2e28-6f2e2f 814->854 819 6b31f8-6b31fb 815->819 820 6b321d-6b3244 SetTimer RegisterWindowMessageW 815->820 822 6f2e7c-6f2e90 call 71bf30 816->822 823 6b31a4-6b31a8 816->823 825 6b3219-6b321b 817->825 824 6b31de-6b31e4 818->824 826 6f2d9c-6f2d9f 819->826 827 6b3201-6b320f KillTimer call 6b30f2 819->827 820->825 829 6b3246-6b3251 CreatePopupMenu 820->829 822->825 847 6f2e96 822->847 830 6b31ae-6b31b3 823->830 831 6f2e68-6f2e72 call 71c161 823->831 825->824 839 6f2dd7-6f2df6 MoveWindow 826->839 840 6f2da1-6f2da5 826->840 842 6b3214 call 6b3c50 827->842 829->825 836 6f2e4d-6f2e54 830->836 837 6b31b9-6b31be 830->837 843 6f2e77 831->843 836->818 841 6f2e5a-6f2e63 call 710ad7 836->841 845 6b3253-6b3263 call 6b326f 837->845 846 6b31c4-6b31ca 837->846 839->825 848 6f2da7-6f2daa 840->848 849 6f2dc6-6f2dd2 SetFocus 840->849 841->818 842->825 843->825 845->825 846->818 846->854 847->818 848->846 850 6f2db0-6f2dc1 call 6b18e2 848->850 849->825 850->825 854->818 858 6f2e35-6f2e48 call 6b30f2 call 6b3837 854->858 858->818
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,006B316A,?,?), ref: 006B31D8
                                                                                                                                                                                                                                                      • KillTimer.USER32(?,00000001,?,?,?,?,?,006B316A,?,?), ref: 006B3204
                                                                                                                                                                                                                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 006B3227
                                                                                                                                                                                                                                                      • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,006B316A,?,?), ref: 006B3232
                                                                                                                                                                                                                                                      • CreatePopupMenu.USER32 ref: 006B3246
                                                                                                                                                                                                                                                      • PostQuitMessage.USER32(00000000), ref: 006B3267
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                                                                                                                                                                                      • String ID: TaskbarCreated
                                                                                                                                                                                                                                                      • API String ID: 129472671-2362178303
                                                                                                                                                                                                                                                      • Opcode ID: cfbb70020931543a97bf0dd9277fde5a0cdc74431dca2737badf76817a532318
                                                                                                                                                                                                                                                      • Instruction ID: 885cbb43e708d2173ccc792391ff6e1a5ddcd0df48d3591f9d03cc0df4471bba
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: cfbb70020931543a97bf0dd9277fde5a0cdc74431dca2737badf76817a532318
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8C413CB53C0228A7DB152B7CDC1EBF93A1FEB06340F548129F501857A1CB799BC29769

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 864 6b1410-6b1449 865 6b144f-6b1465 mciSendStringW 864->865 866 6f24b8-6f24b9 DestroyWindow 864->866 867 6b146b-6b1473 865->867 868 6b16c6-6b16d3 865->868 869 6f24c4-6f24d1 866->869 867->869 870 6b1479-6b1488 call 6b182e 867->870 871 6b16f8-6b16ff 868->871 872 6b16d5-6b16f0 UnregisterHotKey 868->872 874 6f24d3-6f24d6 869->874 875 6f2500-6f2507 869->875 885 6f250e-6f251a 870->885 886 6b148e-6b1496 870->886 871->867 873 6b1705 871->873 872->871 877 6b16f2-6b16f3 call 6b10d0 872->877 873->868 879 6f24d8-6f24e0 call 6b6246 874->879 880 6f24e2-6f24e5 FindClose 874->880 875->869 878 6f2509 875->878 877->871 878->885 884 6f24eb-6f24f8 879->884 880->884 884->875 890 6f24fa-6f24fb call 7232b1 884->890 887 6f251c-6f251e FreeLibrary 885->887 888 6f2524-6f252b 885->888 891 6b149c-6b14c1 call 6bcfa0 886->891 892 6f2532-6f253f 886->892 887->888 888->885 895 6f252d 888->895 890->875 901 6b14f8-6b1503 CoUninitialize 891->901 902 6b14c3 891->902 896 6f2566-6f256d 892->896 897 6f2541-6f255e VirtualFree 892->897 895->892 896->892 900 6f256f 896->900 897->896 899 6f2560-6f2561 call 723317 897->899 899->896 904 6f2574-6f2578 900->904 901->904 906 6b1509-6b150e 901->906 905 6b14c6-6b14f6 call 6b1a05 call 6b19ae 902->905 904->906 907 6f257e-6f2584 904->907 905->901 909 6f2589-6f2596 call 7232eb 906->909 910 6b1514-6b151e 906->910 907->906 922 6f2598 909->922 913 6b1707-6b1714 call 6cf80e 910->913 914 6b1524-6b15a5 call 6b988f call 6b1944 call 6b17d5 call 6cfe14 call 6b177c call 6b988f call 6bcfa0 call 6b17fe call 6cfe14 910->914 913->914 924 6b171a 913->924 926 6f259d-6f25bf call 6cfdcd 914->926 954 6b15ab-6b15cf call 6cfe14 914->954 922->926 924->913 933 6f25c1 926->933 936 6f25c6-6f25e8 call 6cfdcd 933->936 941 6f25ea 936->941 944 6f25ef-6f2611 call 6cfdcd 941->944 950 6f2613 944->950 953 6f2618-6f2625 call 7164d4 950->953 960 6f2627 953->960 954->936 959 6b15d5-6b15f9 call 6cfe14 954->959 959->944 964 6b15ff-6b1619 call 6cfe14 959->964 963 6f262c-6f2639 call 6cac64 960->963 968 6f263b 963->968 964->953 970 6b161f-6b1643 call 6b17d5 call 6cfe14 964->970 971 6f2640-6f264d call 723245 968->971 970->963 979 6b1649-6b1651 970->979 977 6f264f 971->977 980 6f2654-6f2661 call 7232cc 977->980 979->971 981 6b1657-6b1675 call 6b988f call 6b190a 979->981 987 6f2663 980->987 981->980 989 6b167b-6b1689 981->989 990 6f2668-6f2675 call 7232cc 987->990 989->990 991 6b168f-6b16c5 call 6b988f * 3 call 6b1876 989->991 996 6f2677 990->996 996->996
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 006B1459
                                                                                                                                                                                                                                                      • CoUninitialize.COMBASE ref: 006B14F8
                                                                                                                                                                                                                                                      • UnregisterHotKey.USER32(?), ref: 006B16DD
                                                                                                                                                                                                                                                      • DestroyWindow.USER32(?), ref: 006F24B9
                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(?), ref: 006F251E
                                                                                                                                                                                                                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 006F254B
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                                                                                                                                                                                      • String ID: close all
                                                                                                                                                                                                                                                      • API String ID: 469580280-3243417748
                                                                                                                                                                                                                                                      • Opcode ID: a91ce2220e4e501e952817b3065c6aa5ca20052d4b9a4758b5c29d411ff55dbf
                                                                                                                                                                                                                                                      • Instruction ID: 52aff5d19c44e3d1baca7a8b1a972e6eec7b9f9e51a4deda5227542e6188f654
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a91ce2220e4e501e952817b3065c6aa5ca20052d4b9a4758b5c29d411ff55dbf
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 58D18EB1702212DFCB19EF14C4A9AA9F7A2BF06700F5441ADE54AAB352DB30ED52CF54

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 1013 6b2c63-6b2cd3 CreateWindowExW * 2 ShowWindow * 2
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 006B2C91
                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 006B2CB2
                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000000,?,?,?,?,?,?,006B1CAD,?), ref: 006B2CC6
                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000000,?,?,?,?,?,?,006B1CAD,?), ref: 006B2CCF
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$CreateShow
                                                                                                                                                                                                                                                      • String ID: AutoIt v3$edit
                                                                                                                                                                                                                                                      • API String ID: 1584632944-3779509399
                                                                                                                                                                                                                                                      • Opcode ID: 729e447c8dc93d42c62c43f4f82da4c561a08dfd7867daff2749081142d6b20c
                                                                                                                                                                                                                                                      • Instruction ID: da5b81492e6f7123b275cf942dfe7a8603485d2373b8926d5e4b752b5ac1cca5
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 729e447c8dc93d42c62c43f4f82da4c561a08dfd7867daff2749081142d6b20c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 06F0DA755813907AEB721717AC08EB72EBDD7C7F50B60805AF900A29A0C6791852DBB8

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 1438 6b3b1c-6b3b27 1439 6b3b99-6b3b9b 1438->1439 1440 6b3b29-6b3b2e 1438->1440 1441 6b3b8c-6b3b8f 1439->1441 1440->1439 1442 6b3b30-6b3b48 RegOpenKeyExW 1440->1442 1442->1439 1443 6b3b4a-6b3b69 RegQueryValueExW 1442->1443 1444 6b3b6b-6b3b76 1443->1444 1445 6b3b80-6b3b8b RegCloseKey 1443->1445 1446 6b3b78-6b3b7a 1444->1446 1447 6b3b90-6b3b97 1444->1447 1445->1441 1448 6b3b7e 1446->1448 1447->1448 1448->1445
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,006B3B0F,SwapMouseButtons,00000004,?), ref: 006B3B40
                                                                                                                                                                                                                                                      • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,006B3B0F,SwapMouseButtons,00000004,?), ref: 006B3B61
                                                                                                                                                                                                                                                      • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,006B3B0F,SwapMouseButtons,00000004,?), ref: 006B3B83
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseOpenQueryValue
                                                                                                                                                                                                                                                      • String ID: Control Panel\Mouse
                                                                                                                                                                                                                                                      • API String ID: 3677997916-824357125
                                                                                                                                                                                                                                                      • Opcode ID: 6241404e3dfe39d679eaacec566de373e60bd3d3463c253934a7798a43dc2434
                                                                                                                                                                                                                                                      • Instruction ID: ac16a5ff3a0f2fe65c33a2106c11ca8b1aad6b344424ec997b041c4b492c0bea
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6241404e3dfe39d679eaacec566de373e60bd3d3463c253934a7798a43dc2434
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 99115AB5611218FFDB218FA4DC44AEEB7B9EF21740B10855AA801D7224E6319E809764
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 006F33A2
                                                                                                                                                                                                                                                        • Part of subcall function 006B6B57: _wcslen.LIBCMT ref: 006B6B6A
                                                                                                                                                                                                                                                      • Shell_NotifyIconW.SHELL32(00000001,?), ref: 006B3A04
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: IconLoadNotifyShell_String_wcslen
                                                                                                                                                                                                                                                      • String ID: Line:
                                                                                                                                                                                                                                                      • API String ID: 2289894680-1585850449
                                                                                                                                                                                                                                                      • Opcode ID: 838229cdb1473bf5ab57d69ae1e37e1281fa410c8f39b1dcd1b651c131be2415
                                                                                                                                                                                                                                                      • Instruction ID: b1d3c68777ab5e33dc84b6fa19429ca035419538322494e5333f538227ebafe4
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 838229cdb1473bf5ab57d69ae1e37e1281fa410c8f39b1dcd1b651c131be2415
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6B3124B1548320AFC761EB20DC45BEBB7DDAB40310F10452EF19983291EF749A89C7CA
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetOpenFileNameW.COMDLG32(?), ref: 006F2C8C
                                                                                                                                                                                                                                                        • Part of subcall function 006B3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006B3A97,?,?,006B2E7F,?,?,?,00000000), ref: 006B3AC2
                                                                                                                                                                                                                                                        • Part of subcall function 006B2DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006B2DC4
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Name$Path$FileFullLongOpen
                                                                                                                                                                                                                                                      • String ID: X$`ew
                                                                                                                                                                                                                                                      • API String ID: 779396738-2133719843
                                                                                                                                                                                                                                                      • Opcode ID: cbf8f498536339ed97000d2f9646e59ef713fd5c9abec132a4e98f563530c5a4
                                                                                                                                                                                                                                                      • Instruction ID: 22270bde764402dbdea795cd324978ebcb09c17c0ef6f4a2fd42a4f1c63997e0
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: cbf8f498536339ed97000d2f9646e59ef713fd5c9abec132a4e98f563530c5a4
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 112196B1A002589BCF41DF94C8557EE7BF9AF49304F00805DE505A7345DBB856898F65
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 006D0668
                                                                                                                                                                                                                                                        • Part of subcall function 006D32A4: RaiseException.KERNEL32(?,?,?,006D068A,?,00781444,?,?,?,?,?,?,006D068A,006B1129,00778738,006B1129), ref: 006D3304
                                                                                                                                                                                                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 006D0685
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Exception@8Throw$ExceptionRaise
                                                                                                                                                                                                                                                      • String ID: Unknown exception
                                                                                                                                                                                                                                                      • API String ID: 3476068407-410509341
                                                                                                                                                                                                                                                      • Opcode ID: 04c25ba4c484afcd653ed612c6422d884b8e9ba4a0aa6dc1da8fd01efcde8e01
                                                                                                                                                                                                                                                      • Instruction ID: c8f83dce3f7f5dc5721d044a72896a7794714f0ef9dc770e7ff240fa818bcbd6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 04c25ba4c484afcd653ed612c6422d884b8e9ba4a0aa6dc1da8fd01efcde8e01
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D0F0A424D0024977CB40B664E84AEAD776F9E00350B60413BB81496792EF71EA1585C5
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006B1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 006B1BF4
                                                                                                                                                                                                                                                        • Part of subcall function 006B1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 006B1BFC
                                                                                                                                                                                                                                                        • Part of subcall function 006B1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 006B1C07
                                                                                                                                                                                                                                                        • Part of subcall function 006B1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 006B1C12
                                                                                                                                                                                                                                                        • Part of subcall function 006B1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 006B1C1A
                                                                                                                                                                                                                                                        • Part of subcall function 006B1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 006B1C22
                                                                                                                                                                                                                                                        • Part of subcall function 006B1B4A: RegisterWindowMessageW.USER32(00000004,?,006B12C4), ref: 006B1BA2
                                                                                                                                                                                                                                                      • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 006B136A
                                                                                                                                                                                                                                                      • OleInitialize.OLE32 ref: 006B1388
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,00000000), ref: 006F24AB
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1986988660-0
                                                                                                                                                                                                                                                      • Opcode ID: 8ff53e95dd236959f018464356c69ed52393fac7b920b5e83f70544c3ea73f6f
                                                                                                                                                                                                                                                      • Instruction ID: 080587d244d91b0aa8ccb1bfcec072968af356a1123da6aacd0e080c7bc313d2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8ff53e95dd236959f018464356c69ed52393fac7b920b5e83f70544c3ea73f6f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2F717CB49912409EC384EF79A8566953BE9BB893547E4C13E900AC7361EB3C4462CF5D
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006B3923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 006B3A04
                                                                                                                                                                                                                                                      • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0071C259
                                                                                                                                                                                                                                                      • KillTimer.USER32(?,00000001,?,?), ref: 0071C261
                                                                                                                                                                                                                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0071C270
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: IconNotifyShell_Timer$Kill
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3500052701-0
                                                                                                                                                                                                                                                      • Opcode ID: 3297cb1a2c3704a7487a0a09a8892f3e1e9b53d1f4699b764b7804de0d11b412
                                                                                                                                                                                                                                                      • Instruction ID: 8830c75d8b1e13808c44258260d6024a3d08605a64dc62986d3e3f5b267dc455
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3297cb1a2c3704a7487a0a09a8892f3e1e9b53d1f4699b764b7804de0d11b412
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B931E570940344AFEB738FA88855BEBBBFCAB06304F00409ED2DA93281C3785AC4CB55
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CloseHandle.KERNELBASE(00000000,00000000,?,?,006E85CC,?,00778CC8,0000000C), ref: 006E8704
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,006E85CC,?,00778CC8,0000000C), ref: 006E870E
                                                                                                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 006E8739
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2583163307-0
                                                                                                                                                                                                                                                      • Opcode ID: 55b71263421fa9e933d19a3ef72774331f67eaedc7a6d549d754aa297fed2436
                                                                                                                                                                                                                                                      • Instruction ID: 656b395d3841ec5066dcd7984a7ee55f7276bccd10e228bb0147258794952214
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 55b71263421fa9e933d19a3ef72774331f67eaedc7a6d549d754aa297fed2436
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 34016F326073E01EC6A0633658457BE67474B82778F35011DF81D8F2D3DF648C818294
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • TranslateMessage.USER32(?), ref: 006BDB7B
                                                                                                                                                                                                                                                      • DispatchMessageW.USER32(?), ref: 006BDB89
                                                                                                                                                                                                                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006BDB9F
                                                                                                                                                                                                                                                      • Sleep.KERNELBASE(0000000A), ref: 006BDBB1
                                                                                                                                                                                                                                                      • TranslateAcceleratorW.USER32(?,?,?), ref: 00701CC9
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3288985973-0
                                                                                                                                                                                                                                                      • Opcode ID: 6e68efade84bddeb4f060d6b8bf8b145961c94d9d8fc0e888017ad8a6eca0a40
                                                                                                                                                                                                                                                      • Instruction ID: bf717351378b28549e4d15d4ab72121a3abc617bb1f62d988ef1a13b663a57f7
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6e68efade84bddeb4f060d6b8bf8b145961c94d9d8fc0e888017ad8a6eca0a40
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7BF05E706453409BEB70CB608C49FEA73ADEB45310F508A29E61A870C0EB38A4898B29
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • __Init_thread_footer.LIBCMT ref: 006C17F6
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Init_thread_footer
                                                                                                                                                                                                                                                      • String ID: CALL
                                                                                                                                                                                                                                                      • API String ID: 1385522511-4196123274
                                                                                                                                                                                                                                                      • Opcode ID: 4fb7b914a88483a734e4e14b77b96663a0ec2aea3071f9dbaa740d07cc4d24bc
                                                                                                                                                                                                                                                      • Instruction ID: a468badac148e2ac9fd4b18619f7f1c5226511af67e21f20db162efbc4f52eeb
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4fb7b914a88483a734e4e14b77b96663a0ec2aea3071f9dbaa740d07cc4d24bc
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2F2269B0608201DFC714DF14C894F6ABBE2EF8A314F24895DF4968B3A2D735E951CB96
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • Shell_NotifyIconW.SHELL32(00000000,?), ref: 006B3908
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: IconNotifyShell_
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1144537725-0
                                                                                                                                                                                                                                                      • Opcode ID: f6638d1e66fbe6682906eb0ea1902d3151d42f6aa15ee5043bb249cc81cea6a3
                                                                                                                                                                                                                                                      • Instruction ID: 3fbb0db324c987eea548db56863279263ca514b8fe0458fe167c6e6c96d3b80f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f6638d1e66fbe6682906eb0ea1902d3151d42f6aa15ee5043bb249cc81cea6a3
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4C31ACB0A043119FD361DF24D8847D7BBE8FB49308F00092EF69A83780E775AA85CB56
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • timeGetTime.WINMM ref: 006CF661
                                                                                                                                                                                                                                                        • Part of subcall function 006BD730: GetInputState.USER32 ref: 006BD807
                                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000), ref: 0070F2DE
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: InputSleepStateTimetime
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 4149333218-0
                                                                                                                                                                                                                                                      • Opcode ID: 44e3b766135a6f31fe37d97a7cd41b13c7a17e82a9a9a8cf0b1ccfc894de3bba
                                                                                                                                                                                                                                                      • Instruction ID: 47a8d6f2a10b205f832b63076b0e613d97ffd6356c43b83c45f2151df51f9517
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 44e3b766135a6f31fe37d97a7cd41b13c7a17e82a9a9a8cf0b1ccfc894de3bba
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D9F082752402059FD350EF65D445BAAB7E9FF45760F00402EE85AC7260DB70A840CB95
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006B4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,006B4EDD,?,00781418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 006B4E9C
                                                                                                                                                                                                                                                        • Part of subcall function 006B4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 006B4EAE
                                                                                                                                                                                                                                                        • Part of subcall function 006B4E90: FreeLibrary.KERNEL32(00000000,?,?,006B4EDD,?,00781418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 006B4EC0
                                                                                                                                                                                                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00781418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 006B4EFD
                                                                                                                                                                                                                                                        • Part of subcall function 006B4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,006F3CDE,?,00781418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 006B4E62
                                                                                                                                                                                                                                                        • Part of subcall function 006B4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 006B4E74
                                                                                                                                                                                                                                                        • Part of subcall function 006B4E59: FreeLibrary.KERNEL32(00000000,?,?,006F3CDE,?,00781418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 006B4E87
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Library$Load$AddressFreeProc
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2632591731-0
                                                                                                                                                                                                                                                      • Opcode ID: be33a873cbdb6268b7a86f0f4d994e927baec1b6fe0f63d038017e25292819fa
                                                                                                                                                                                                                                                      • Instruction ID: 0f53cb24f48c8b1e3ff72aaef45c9cee3249f3338af0b0b66434302eb69e1126
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: be33a873cbdb6268b7a86f0f4d994e927baec1b6fe0f63d038017e25292819fa
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7911E772600305AACF64BB64DC02FFD77AAAF80710F10842DF542A72C2DE75DA859758
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: __wsopen_s
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3347428461-0
                                                                                                                                                                                                                                                      • Opcode ID: ee6874fc61751c6c13f667b3de536704b01bc3ae5fda8fe1a32c6e1c1a5d5503
                                                                                                                                                                                                                                                      • Instruction ID: d96037e366d99f625c49965181b48bc8d97792c47584c9ab6fe75dcee5382aaa
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ee6874fc61751c6c13f667b3de536704b01bc3ae5fda8fe1a32c6e1c1a5d5503
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4711187590420AEFCB05DF59E9419DA7BF5EF48314F104059F808AB352DA31DA11CBA5
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006E4C7D: RtlAllocateHeap.NTDLL(00000008,006B1129,00000000,?,006E2E29,00000001,00000364,?,?,?,006DF2DE,006E3863,00781444,?,006CFDF5,?), ref: 006E4CBE
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006E506C
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AllocateHeap_free
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 614378929-0
                                                                                                                                                                                                                                                      • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                                                                                                                                                                                                      • Instruction ID: 17121daef634b8f591750a526defdc9f57f9ffc2ab7e44975b03e07902c15fce
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F50149722057456FE3318F66D885A9AFBEEFB89370F25051DF185832C0EA70A805C7B4
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                                                                                                                                                                                                      • Instruction ID: b92c6a3ddeadec82131c1094ec7ca5e264ffc5d17c94b27df5f7b39887241393
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C7F0F932D11B549AC6313A668C05B96339F9F52335F10071FF4259B3D2DB75E40286ED
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • RtlAllocateHeap.NTDLL(00000008,006B1129,00000000,?,006E2E29,00000001,00000364,?,?,?,006DF2DE,006E3863,00781444,?,006CFDF5,?), ref: 006E4CBE
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AllocateHeap
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1279760036-0
                                                                                                                                                                                                                                                      • Opcode ID: 59f2b2f031493d1ce0c13e6143dac6f5df63fce837e037b4f245104a0d55ebcf
                                                                                                                                                                                                                                                      • Instruction ID: 207ae60ef81d0fb3e3f4d2daa3a968ef5229a2621b69482f0e7223d85076a924
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 59f2b2f031493d1ce0c13e6143dac6f5df63fce837e037b4f245104a0d55ebcf
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E6F0B4316033A467DB215F739C05F9A378BAF81BA0B348116B81AAB794CE30DC0186E4
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • RtlAllocateHeap.NTDLL(00000000,?,00781444,?,006CFDF5,?,?,006BA976,00000010,00781440,006B13FC,?,006B13C6,?,006B1129), ref: 006E3852
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AllocateHeap
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1279760036-0
                                                                                                                                                                                                                                                      • Opcode ID: 7879e6c2af2cc36f6256852068dca1c931be8d247b02db2e1c854bb2b5598909
                                                                                                                                                                                                                                                      • Instruction ID: dc203de53317e52b7134f5a5ca4d7145d8f224d5c940461b545a6b0fef3ccd17
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7879e6c2af2cc36f6256852068dca1c931be8d247b02db2e1c854bb2b5598909
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E2E030315033B466D63126A79C09BDB375BAF827B0B150126B81697791DB21DE0282E5
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(?,?,00781418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 006B4F6D
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FreeLibrary
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3664257935-0
                                                                                                                                                                                                                                                      • Opcode ID: 53df3f1f6d348092874c3c45cbed51fe9dd025349542a6a7d9464e5760f070ba
                                                                                                                                                                                                                                                      • Instruction ID: 6dcaa52789ce5f26906b4183e7393e072f2dba45734362cc61c35f789a4401fc
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 53df3f1f6d348092874c3c45cbed51fe9dd025349542a6a7d9464e5760f070ba
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E5F030B1505751CFDB349F64D4908A2B7FAEF55319310C97EE2DA83612CB319884DF10
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • IsWindow.USER32(00000000), ref: 00742A66
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2353593579-0
                                                                                                                                                                                                                                                      • Opcode ID: 39d3347f1ef5c65f2d5704b269a24be43da3e74399b11cd335731c5918ecf56b
                                                                                                                                                                                                                                                      • Instruction ID: b489bd04daf869ed7c38deee8f487cdc7b84b502896d75ad19cc8caa34c0746e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 39d3347f1ef5c65f2d5704b269a24be43da3e74399b11cd335731c5918ecf56b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A5E0DF3636012AAAC710EA30EC888FA734CEB113957508536BC2AC3141DB389AA286A0
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • Shell_NotifyIconW.SHELL32(00000002,?), ref: 006B314E
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: IconNotifyShell_
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1144537725-0
                                                                                                                                                                                                                                                      • Opcode ID: cc560e2c1543302d4b71f2391a83cf8cc502eb3ac1993b51457c7f1c678849fb
                                                                                                                                                                                                                                                      • Instruction ID: f59aa365fb19aee8ed38e9db5c48b3d26091800b6c68119379719c53baf72234
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: cc560e2c1543302d4b71f2391a83cf8cc502eb3ac1993b51457c7f1c678849fb
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: EDF0A7709403149FE7929B24DC467D57BBCA701708F1040E9A24896681D7744789CF45
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006B2DC4
                                                                                                                                                                                                                                                        • Part of subcall function 006B6B57: _wcslen.LIBCMT ref: 006B6B6A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: LongNamePath_wcslen
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 541455249-0
                                                                                                                                                                                                                                                      • Opcode ID: 4384e8511b0d1b84f84054ffa7d18190beb261cea16c3a40efe67d8bc5175b32
                                                                                                                                                                                                                                                      • Instruction ID: 4591020e09749641a246dbd2ad85dd08ecba521cec89e9e65d79d7fa8b52bbf1
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4384e8511b0d1b84f84054ffa7d18190beb261cea16c3a40efe67d8bc5175b32
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2AE0CD766011245BC7519258DC05FEA77EDDFC97D0F044075FE09D7248DAA4AD808654
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006B3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 006B3908
                                                                                                                                                                                                                                                        • Part of subcall function 006BD730: GetInputState.USER32 ref: 006BD807
                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 006B2B6B
                                                                                                                                                                                                                                                        • Part of subcall function 006B30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 006B314E
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3667716007-0
                                                                                                                                                                                                                                                      • Opcode ID: f9e41a36e25e7a7e5337b698baed039f6aff837f4e4719f8a8de7219fb0b46d7
                                                                                                                                                                                                                                                      • Instruction ID: 8be5278c8193e966840eb1902d4e66d92166d433664e5f1d29f124230dea19ef
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f9e41a36e25e7a7e5337b698baed039f6aff837f4e4719f8a8de7219fb0b46d7
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 23E086B130425406CA88BB7498625EDA75F9FD1355F40553EF14647263DF2845C6435A
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CreateFileW.KERNELBASE(00000000,00000000,?,006F0704,?,?,00000000,?,006F0704,00000000,0000000C), ref: 006F03B7
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CreateFile
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 823142352-0
                                                                                                                                                                                                                                                      • Opcode ID: 03c6b1d9d9bb810be109e416143d6b074482dcbdcc8742af6b452fc33ca91b8d
                                                                                                                                                                                                                                                      • Instruction ID: a8e1204b23f489aef5dfd13061e1e69818044aaeb71be69b1e3bc348309604b5
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 03c6b1d9d9bb810be109e416143d6b074482dcbdcc8742af6b452fc33ca91b8d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 56D06C3204010DBBDF028F84DD06EDA3BAAFB48714F018000BE1856020C736E821AB94
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 006B1CBC
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: InfoParametersSystem
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3098949447-0
                                                                                                                                                                                                                                                      • Opcode ID: de1c93110ed49338e2a6a2a7ce928533ec0a6e23f96ad879310d87e8537a2823
                                                                                                                                                                                                                                                      • Instruction ID: 03a91f33f04892cff53d1d0189618c0f9a66b29a7f218f03096e854dd0c8051e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: de1c93110ed49338e2a6a2a7ce928533ec0a6e23f96ad879310d87e8537a2823
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9DC09B352C03049FF2154780FC5AF547758A348B01F74C001F709955E3C3A51431D758
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 006C9BB2
                                                                                                                                                                                                                                                      • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0074961A
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0074965B
                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0074969F
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 007496C9
                                                                                                                                                                                                                                                      • SendMessageW.USER32 ref: 007496F2
                                                                                                                                                                                                                                                      • GetKeyState.USER32(00000011), ref: 0074978B
                                                                                                                                                                                                                                                      • GetKeyState.USER32(00000009), ref: 00749798
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 007497AE
                                                                                                                                                                                                                                                      • GetKeyState.USER32(00000010), ref: 007497B8
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 007497E9
                                                                                                                                                                                                                                                      • SendMessageW.USER32 ref: 00749810
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001030,?,00747E95), ref: 00749918
                                                                                                                                                                                                                                                      • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0074992E
                                                                                                                                                                                                                                                      • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00749941
                                                                                                                                                                                                                                                      • SetCapture.USER32(?), ref: 0074994A
                                                                                                                                                                                                                                                      • ClientToScreen.USER32(?,?), ref: 007499AF
                                                                                                                                                                                                                                                      • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 007499BC
                                                                                                                                                                                                                                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 007499D6
                                                                                                                                                                                                                                                      • ReleaseCapture.USER32 ref: 007499E1
                                                                                                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00749A19
                                                                                                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 00749A26
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 00749A80
                                                                                                                                                                                                                                                      • SendMessageW.USER32 ref: 00749AAE
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00749AEB
                                                                                                                                                                                                                                                      • SendMessageW.USER32 ref: 00749B1A
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00749B3B
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00749B4A
                                                                                                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00749B68
                                                                                                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 00749B75
                                                                                                                                                                                                                                                      • GetParent.USER32(?), ref: 00749B93
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 00749BFA
                                                                                                                                                                                                                                                      • SendMessageW.USER32 ref: 00749C2B
                                                                                                                                                                                                                                                      • ClientToScreen.USER32(?,?), ref: 00749C84
                                                                                                                                                                                                                                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00749CB4
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00749CDE
                                                                                                                                                                                                                                                      • SendMessageW.USER32 ref: 00749D01
                                                                                                                                                                                                                                                      • ClientToScreen.USER32(?,?), ref: 00749D4E
                                                                                                                                                                                                                                                      • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00749D82
                                                                                                                                                                                                                                                        • Part of subcall function 006C9944: GetWindowLongW.USER32(?,000000EB), ref: 006C9952
                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00749E05
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                                                                                                                                                                                                                      • String ID: @GUI_DRAGID$F$p#x
                                                                                                                                                                                                                                                      • API String ID: 3429851547-3050798211
                                                                                                                                                                                                                                                      • Opcode ID: 227edda5a3fa29fe2a7d1f73abf6bbcaec8bddfeeb96c5f6c027cbcaf6420578
                                                                                                                                                                                                                                                      • Instruction ID: 0ae915034414560e6f05f5efcdc309597a8bf48c895bfbd4cbde5e0caa30b8e1
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 227edda5a3fa29fe2a7d1f73abf6bbcaec8bddfeeb96c5f6c027cbcaf6420578
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 06428A34204241EFDB25CF24CC44EABBBE9FF49310F11865AF699872A1D739A851CF56
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 007448F3
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00744908
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00744927
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 0074494B
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 0074495C
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 0074497B
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 007449AE
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 007449D4
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00744A0F
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00744A56
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00744A7E
                                                                                                                                                                                                                                                      • IsMenu.USER32(?), ref: 00744A97
                                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00744AF2
                                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00744B20
                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00744B94
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00744BE3
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00744C82
                                                                                                                                                                                                                                                      • wsprintfW.USER32 ref: 00744CAE
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00744CC9
                                                                                                                                                                                                                                                      • GetWindowTextW.USER32(?,00000000,00000001), ref: 00744CF1
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00744D13
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00744D33
                                                                                                                                                                                                                                                      • GetWindowTextW.USER32(?,00000000,00000001), ref: 00744D5A
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                                                                                                                                                                                                                      • String ID: %d/%02d/%02d
                                                                                                                                                                                                                                                      • API String ID: 4054740463-328681919
                                                                                                                                                                                                                                                      • Opcode ID: 37b042cb091ea7b8640243c6af7b0727dd7a6f7b71446431fda59d5483da13df
                                                                                                                                                                                                                                                      • Instruction ID: 3e808342bb0d14fdf147d8110bb034c5db60bb3ffde9bec89fa7e4f26df7325a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 37b042cb091ea7b8640243c6af7b0727dd7a6f7b71446431fda59d5483da13df
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 40122271600214ABEB258F24CC49FAE7BF9FF46310F14816AF916EB2E1DB789941DB50
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 006CF998
                                                                                                                                                                                                                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0070F474
                                                                                                                                                                                                                                                      • IsIconic.USER32(00000000), ref: 0070F47D
                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000000,00000009), ref: 0070F48A
                                                                                                                                                                                                                                                      • SetForegroundWindow.USER32(00000000), ref: 0070F494
                                                                                                                                                                                                                                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0070F4AA
                                                                                                                                                                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 0070F4B1
                                                                                                                                                                                                                                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0070F4BD
                                                                                                                                                                                                                                                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 0070F4CE
                                                                                                                                                                                                                                                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 0070F4D6
                                                                                                                                                                                                                                                      • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 0070F4DE
                                                                                                                                                                                                                                                      • SetForegroundWindow.USER32(00000000), ref: 0070F4E1
                                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0070F4F6
                                                                                                                                                                                                                                                      • keybd_event.USER32(00000012,00000000), ref: 0070F501
                                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0070F50B
                                                                                                                                                                                                                                                      • keybd_event.USER32(00000012,00000000), ref: 0070F510
                                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0070F519
                                                                                                                                                                                                                                                      • keybd_event.USER32(00000012,00000000), ref: 0070F51E
                                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0070F528
                                                                                                                                                                                                                                                      • keybd_event.USER32(00000012,00000000), ref: 0070F52D
                                                                                                                                                                                                                                                      • SetForegroundWindow.USER32(00000000), ref: 0070F530
                                                                                                                                                                                                                                                      • AttachThreadInput.USER32(?,000000FF,00000000), ref: 0070F557
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                                                                                                                                                                                      • String ID: Shell_TrayWnd
                                                                                                                                                                                                                                                      • API String ID: 4125248594-2988720461
                                                                                                                                                                                                                                                      • Opcode ID: 9dc0b9ec8ff8306b2a0e67134a8406b423456c35f758e474fa36152a9f7cfb1d
                                                                                                                                                                                                                                                      • Instruction ID: 2aea01617726a223ef4611528815de8a4d4356db79b2d9b9d49cf13ae1a5fd84
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9dc0b9ec8ff8306b2a0e67134a8406b423456c35f758e474fa36152a9f7cfb1d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4431C675A41318BFEB316BB54C4AFBF7EACEB45B50F204026FA00E61D1C7B85D10AA65
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 007116C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0071170D
                                                                                                                                                                                                                                                        • Part of subcall function 007116C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0071173A
                                                                                                                                                                                                                                                        • Part of subcall function 007116C3: GetLastError.KERNEL32 ref: 0071174A
                                                                                                                                                                                                                                                      • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00711286
                                                                                                                                                                                                                                                      • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 007112A8
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 007112B9
                                                                                                                                                                                                                                                      • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 007112D1
                                                                                                                                                                                                                                                      • GetProcessWindowStation.USER32 ref: 007112EA
                                                                                                                                                                                                                                                      • SetProcessWindowStation.USER32(00000000), ref: 007112F4
                                                                                                                                                                                                                                                      • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00711310
                                                                                                                                                                                                                                                        • Part of subcall function 007110BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,007111FC), ref: 007110D4
                                                                                                                                                                                                                                                        • Part of subcall function 007110BF: CloseHandle.KERNEL32(?,?,007111FC), ref: 007110E9
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                                                                                                                                                                                                                      • String ID: $default$winsta0$Zw
                                                                                                                                                                                                                                                      • API String ID: 22674027-1034679043
                                                                                                                                                                                                                                                      • Opcode ID: 13fa2648db1e3f5decadc26e53c2f45b7a07c55afb77e051f509ccdb169cfa01
                                                                                                                                                                                                                                                      • Instruction ID: be402bd6f873e81b3df66918cb39fb28c481c70058b3ff2e727ad854c53a20b6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 13fa2648db1e3f5decadc26e53c2f45b7a07c55afb77e051f509ccdb169cfa01
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4981C371900249AFDF11DFA8DC49FEE7BB9EF05704F14812AFE10AA1A0D7798984CB65
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 007110F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00711114
                                                                                                                                                                                                                                                        • Part of subcall function 007110F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00710B9B,?,?,?), ref: 00711120
                                                                                                                                                                                                                                                        • Part of subcall function 007110F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00710B9B,?,?,?), ref: 0071112F
                                                                                                                                                                                                                                                        • Part of subcall function 007110F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00710B9B,?,?,?), ref: 00711136
                                                                                                                                                                                                                                                        • Part of subcall function 007110F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0071114D
                                                                                                                                                                                                                                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00710BCC
                                                                                                                                                                                                                                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00710C00
                                                                                                                                                                                                                                                      • GetLengthSid.ADVAPI32(?), ref: 00710C17
                                                                                                                                                                                                                                                      • GetAce.ADVAPI32(?,00000000,?), ref: 00710C51
                                                                                                                                                                                                                                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00710C6D
                                                                                                                                                                                                                                                      • GetLengthSid.ADVAPI32(?), ref: 00710C84
                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00710C8C
                                                                                                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000), ref: 00710C93
                                                                                                                                                                                                                                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00710CB4
                                                                                                                                                                                                                                                      • CopySid.ADVAPI32(00000000), ref: 00710CBB
                                                                                                                                                                                                                                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00710CEA
                                                                                                                                                                                                                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00710D0C
                                                                                                                                                                                                                                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00710D1E
                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00710D45
                                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00710D4C
                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00710D55
                                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00710D5C
                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00710D65
                                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00710D6C
                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00710D78
                                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00710D7F
                                                                                                                                                                                                                                                        • Part of subcall function 00711193: GetProcessHeap.KERNEL32(00000008,00710BB1,?,00000000,?,00710BB1,?), ref: 007111A1
                                                                                                                                                                                                                                                        • Part of subcall function 00711193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00710BB1,?), ref: 007111A8
                                                                                                                                                                                                                                                        • Part of subcall function 00711193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00710BB1,?), ref: 007111B7
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 4175595110-0
                                                                                                                                                                                                                                                      • Opcode ID: 1fd6efc5267ef28d7f390a7c6a5ff3ee8bedddf58021a3e66b85bad4908d76ff
                                                                                                                                                                                                                                                      • Instruction ID: f878da1dda100ff84a8eba2cb26f3a15f90311716c016df15bb469e7792e290a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1fd6efc5267ef28d7f390a7c6a5ff3ee8bedddf58021a3e66b85bad4908d76ff
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5F7190B5A0120AABDF11DFE8DC45FEEBBB8BF05300F048115E954A7191D7B9A985CBA0
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • OpenClipboard.USER32(0074CC08), ref: 0072EB29
                                                                                                                                                                                                                                                      • IsClipboardFormatAvailable.USER32(0000000D), ref: 0072EB37
                                                                                                                                                                                                                                                      • GetClipboardData.USER32(0000000D), ref: 0072EB43
                                                                                                                                                                                                                                                      • CloseClipboard.USER32 ref: 0072EB4F
                                                                                                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 0072EB87
                                                                                                                                                                                                                                                      • CloseClipboard.USER32 ref: 0072EB91
                                                                                                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0072EBBC
                                                                                                                                                                                                                                                      • IsClipboardFormatAvailable.USER32(00000001), ref: 0072EBC9
                                                                                                                                                                                                                                                      • GetClipboardData.USER32(00000001), ref: 0072EBD1
                                                                                                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 0072EBE2
                                                                                                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0072EC22
                                                                                                                                                                                                                                                      • IsClipboardFormatAvailable.USER32(0000000F), ref: 0072EC38
                                                                                                                                                                                                                                                      • GetClipboardData.USER32(0000000F), ref: 0072EC44
                                                                                                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 0072EC55
                                                                                                                                                                                                                                                      • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0072EC77
                                                                                                                                                                                                                                                      • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0072EC94
                                                                                                                                                                                                                                                      • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0072ECD2
                                                                                                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0072ECF3
                                                                                                                                                                                                                                                      • CountClipboardFormats.USER32 ref: 0072ED14
                                                                                                                                                                                                                                                      • CloseClipboard.USER32 ref: 0072ED59
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 420908878-0
                                                                                                                                                                                                                                                      • Opcode ID: cf91f4acb537d6dfe6711c8b685ea4332865801f63d743b755bae40bc168be68
                                                                                                                                                                                                                                                      • Instruction ID: 02fbddb7567a2e78a0bfbfe3852d6882bc0c1cc7905fdbe34cf81aa7e7436b6b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: cf91f4acb537d6dfe6711c8b685ea4332865801f63d743b755bae40bc168be68
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4561F178204301AFD341EF24E888F6A7BE4BF85714F18851EF456872A2CB79DD45CB66
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 007269BE
                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00726A12
                                                                                                                                                                                                                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00726A4E
                                                                                                                                                                                                                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00726A75
                                                                                                                                                                                                                                                        • Part of subcall function 006B9CB3: _wcslen.LIBCMT ref: 006B9CBD
                                                                                                                                                                                                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00726AB2
                                                                                                                                                                                                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00726ADF
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                                                                                                                                                                                                                      • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                                                                                                                                                                                                      • API String ID: 3830820486-3289030164
                                                                                                                                                                                                                                                      • Opcode ID: cd2de3e49a2c1147dc4ab25ef1ce1ec61680c7562a0fc8291b77242ca26fa0e7
                                                                                                                                                                                                                                                      • Instruction ID: d581453a8e67b4c83fab8881cc3ac1ef65d86a16054adc36b8c3aedd9b1ab374
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: cd2de3e49a2c1147dc4ab25ef1ce1ec61680c7562a0fc8291b77242ca26fa0e7
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 94D151B2508300AFC754EB64D885EBBB7FDAF88704F04491EF589D6191EB78DA44CB62
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00729663
                                                                                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(?), ref: 007296A1
                                                                                                                                                                                                                                                      • SetFileAttributesW.KERNEL32(?,?), ref: 007296BB
                                                                                                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 007296D3
                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 007296DE
                                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 007296FA
                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 0072974A
                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(00776B7C), ref: 00729768
                                                                                                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00729772
                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 0072977F
                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 0072978F
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                                                                                                                                                                                                      • String ID: *.*
                                                                                                                                                                                                                                                      • API String ID: 1409584000-438819550
                                                                                                                                                                                                                                                      • Opcode ID: 7a85af0e7c8f78c3b8ffa089cda6d7e6df392c3264e94c25a21cf22abf8c0c86
                                                                                                                                                                                                                                                      • Instruction ID: 8d696d3a32bdfb7673d896e19f6db73c8d418dc6e1b2abd5883d87be235037b3
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7a85af0e7c8f78c3b8ffa089cda6d7e6df392c3264e94c25a21cf22abf8c0c86
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C53108765416296FDF10DFB4EC48ADE77BCAF0A320F14805AFA05E21A0DB78DE448E18
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 007297BE
                                                                                                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00729819
                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00729824
                                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 00729840
                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00729890
                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(00776B7C), ref: 007298AE
                                                                                                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 007298B8
                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 007298C5
                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 007298D5
                                                                                                                                                                                                                                                        • Part of subcall function 0071DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 0071DB00
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                                                                                                                                                                                                      • String ID: *.*
                                                                                                                                                                                                                                                      • API String ID: 2640511053-438819550
                                                                                                                                                                                                                                                      • Opcode ID: ab57a9fb00af715f071e7c813ace874595a35d78d6278ccd5298663659f96ae7
                                                                                                                                                                                                                                                      • Instruction ID: 38bee5507e40f39801d64df12b757e3566a550d75d4df430d4663c54ef5ab5d5
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ab57a9fb00af715f071e7c813ace874595a35d78d6278ccd5298663659f96ae7
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6E31D871541629AAEF15DFB4EC48ADE77ACAF06320F188156E614E21A0DB78DE44CB24
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 0073C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0073B6AE,?,?), ref: 0073C9B5
                                                                                                                                                                                                                                                        • Part of subcall function 0073C998: _wcslen.LIBCMT ref: 0073C9F1
                                                                                                                                                                                                                                                        • Part of subcall function 0073C998: _wcslen.LIBCMT ref: 0073CA68
                                                                                                                                                                                                                                                        • Part of subcall function 0073C998: _wcslen.LIBCMT ref: 0073CA9E
                                                                                                                                                                                                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0073BF3E
                                                                                                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 0073BFA9
                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 0073BFCD
                                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0073C02C
                                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 0073C0E7
                                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0073C154
                                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0073C1E9
                                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 0073C23A
                                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0073C2E3
                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0073C382
                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 0073C38F
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3102970594-0
                                                                                                                                                                                                                                                      • Opcode ID: 3409f4323f3fcccee5dac6917879e44a07d4a4abbd169bf6dd4fefd42f0d9935
                                                                                                                                                                                                                                                      • Instruction ID: e5710fa15bb36306348a4ceb873d400161d7a9d064bde43c94245781e9ce333c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3409f4323f3fcccee5dac6917879e44a07d4a4abbd169bf6dd4fefd42f0d9935
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 64026E71604200AFD755DF28C891E2ABBE5EF89304F18C49DF84ADB2A2DB35EC45CB52
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetLocalTime.KERNEL32(?), ref: 00728257
                                                                                                                                                                                                                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00728267
                                                                                                                                                                                                                                                      • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00728273
                                                                                                                                                                                                                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00728310
                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00728324
                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00728356
                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0072838C
                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00728395
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CurrentDirectoryTime$File$Local$System
                                                                                                                                                                                                                                                      • String ID: *.*
                                                                                                                                                                                                                                                      • API String ID: 1464919966-438819550
                                                                                                                                                                                                                                                      • Opcode ID: aa0b90d4643c6a68a1c02416e5573d987bbc464ebad019d6df9be581401c2091
                                                                                                                                                                                                                                                      • Instruction ID: 92c93a46780408dd3a05b36d6476cb9a5069089648c49e0b83ff265a7cb8a83f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: aa0b90d4643c6a68a1c02416e5573d987bbc464ebad019d6df9be581401c2091
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8061ADB25043159FCB50EF64D8409AEB3E9FF89310F04891EF989C7251EB3AE945CB96
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006B3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006B3A97,?,?,006B2E7F,?,?,?,00000000), ref: 006B3AC2
                                                                                                                                                                                                                                                        • Part of subcall function 0071E199: GetFileAttributesW.KERNEL32(?,0071CF95), ref: 0071E19A
                                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 0071D122
                                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 0071D1DD
                                                                                                                                                                                                                                                      • MoveFileW.KERNEL32(?,?), ref: 0071D1F0
                                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 0071D20D
                                                                                                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 0071D237
                                                                                                                                                                                                                                                        • Part of subcall function 0071D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,0071D21C,?,?), ref: 0071D2B2
                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000,?,?,?), ref: 0071D253
                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 0071D264
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                                                                                                                                                                                                      • String ID: \*.*
                                                                                                                                                                                                                                                      • API String ID: 1946585618-1173974218
                                                                                                                                                                                                                                                      • Opcode ID: d5afc55a3306a1ae572474b28cbc76b0227d89aa35fb1d57d89c4b345e50aec3
                                                                                                                                                                                                                                                      • Instruction ID: d51470742ca4a66af165ee0162611eb67ec4c24c95b046bf2fa5d1cedcefecea
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d5afc55a3306a1ae572474b28cbc76b0227d89aa35fb1d57d89c4b345e50aec3
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 20617D7180111DABCF15EBE8CD929EDB7B6AF15300F248169E40277191EB38AF89DF64
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1737998785-0
                                                                                                                                                                                                                                                      • Opcode ID: 054b1d3ae5b6fb02088b62248d26a43e83501da242fff2da9633abb44baff6cb
                                                                                                                                                                                                                                                      • Instruction ID: 784f39c654e5012f12ac953fd28ec45b252bc917e748605021c986b454c0bbb8
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 054b1d3ae5b6fb02088b62248d26a43e83501da242fff2da9633abb44baff6cb
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0541EF35604221AFE321CF15E888B29BBE5FF44328F15C09EE4158BB62C779EC41CB95
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 007116C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0071170D
                                                                                                                                                                                                                                                        • Part of subcall function 007116C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0071173A
                                                                                                                                                                                                                                                        • Part of subcall function 007116C3: GetLastError.KERNEL32 ref: 0071174A
                                                                                                                                                                                                                                                      • ExitWindowsEx.USER32(?,00000000), ref: 0071E932
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                                                                                                                                                                                      • String ID: $ $@$SeShutdownPrivilege
                                                                                                                                                                                                                                                      • API String ID: 2234035333-3163812486
                                                                                                                                                                                                                                                      • Opcode ID: 37aa2a47cb919d5f8dc5eae9d846ad63a0c95fc54df73c50d2666da79651ebfa
                                                                                                                                                                                                                                                      • Instruction ID: 5ea392b2419ab3afca987bb8f3797ae2b9b7bbb676e1c54474b51fc7f7205045
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 37aa2a47cb919d5f8dc5eae9d846ad63a0c95fc54df73c50d2666da79651ebfa
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: EE01F976A10311ABEB5466BC9C8AFFF726CAB18750F154422FD03E21D1D6AD7CC085A5
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00731276
                                                                                                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 00731283
                                                                                                                                                                                                                                                      • bind.WSOCK32(00000000,?,00000010), ref: 007312BA
                                                                                                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 007312C5
                                                                                                                                                                                                                                                      • closesocket.WSOCK32(00000000), ref: 007312F4
                                                                                                                                                                                                                                                      • listen.WSOCK32(00000000,00000005), ref: 00731303
                                                                                                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 0073130D
                                                                                                                                                                                                                                                      • closesocket.WSOCK32(00000000), ref: 0073133C
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorLast$closesocket$bindlistensocket
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 540024437-0
                                                                                                                                                                                                                                                      • Opcode ID: 939d7713f7d6ab3f18aafa4f4c8f72daf1482eeb1c7dd4248da45d462cafab4f
                                                                                                                                                                                                                                                      • Instruction ID: 5b14cff819d54bfc1991ece1dc343884e1fb94a806cbb93455284b6261955dd8
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 939d7713f7d6ab3f18aafa4f4c8f72daf1482eeb1c7dd4248da45d462cafab4f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B44191756001109FE710DF24C488B6ABBE6BF86318F58C199E8568F297C779ED81CBE1
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006B3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006B3A97,?,?,006B2E7F,?,?,?,00000000), ref: 006B3AC2
                                                                                                                                                                                                                                                        • Part of subcall function 0071E199: GetFileAttributesW.KERNEL32(?,0071CF95), ref: 0071E19A
                                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 0071D420
                                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 0071D470
                                                                                                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 0071D481
                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 0071D498
                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 0071D4A1
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                                                                                                                                                                                                      • String ID: \*.*
                                                                                                                                                                                                                                                      • API String ID: 2649000838-1173974218
                                                                                                                                                                                                                                                      • Opcode ID: d4be3f2508cded78ab1e8599c538eb02da3bd394d31e8233e15f57cc728bd6ca
                                                                                                                                                                                                                                                      • Instruction ID: c01b8233e65b94deb1f9f5e86f301de724224fcae3b484137b5d672efd3e8c28
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d4be3f2508cded78ab1e8599c538eb02da3bd394d31e8233e15f57cc728bd6ca
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FD31B071008391ABC355EF64C8918EF77E9BE92300F404E1EF8D142191EB74AE49CB67
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: __floor_pentium4
                                                                                                                                                                                                                                                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                                                                                                                                                                      • API String ID: 4168288129-2761157908
                                                                                                                                                                                                                                                      • Opcode ID: e50d47826e3b15e854738fd145fdb4881bb4975c9f0cff77c0c3c8bfbe5ae56b
                                                                                                                                                                                                                                                      • Instruction ID: 68e551c6f44f3efc3e640a14504317579f915fbe42a71ee5ebcba193a94bb181
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e50d47826e3b15e854738fd145fdb4881bb4975c9f0cff77c0c3c8bfbe5ae56b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 41C25B71E056688FDB25CF29DD407EAB7B6EB48305F1441EAD80DE7281E779AE818F40
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 007264DC
                                                                                                                                                                                                                                                      • CoInitialize.OLE32(00000000), ref: 00726639
                                                                                                                                                                                                                                                      • CoCreateInstance.OLE32(0074FCF8,00000000,00000001,0074FB68,?), ref: 00726650
                                                                                                                                                                                                                                                      • CoUninitialize.OLE32 ref: 007268D4
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                                                                                                                                                                                                      • String ID: .lnk
                                                                                                                                                                                                                                                      • API String ID: 886957087-24824748
                                                                                                                                                                                                                                                      • Opcode ID: 4ea5fc9d8e65f1575f0720c5b6500eda0ebd631b8edc6886c70d369b4931700a
                                                                                                                                                                                                                                                      • Instruction ID: c368b0d46671e3ff412e2c57068f726b531aad9ab6f2d34a06ba1de217955722
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4ea5fc9d8e65f1575f0720c5b6500eda0ebd631b8edc6886c70d369b4931700a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DBD14AB1508311AFC354EF24C8819ABB7E9FF94704F10496DF5958B2A1EB70ED45CBA2
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetForegroundWindow.USER32(?,?,00000000), ref: 007322E8
                                                                                                                                                                                                                                                        • Part of subcall function 0072E4EC: GetWindowRect.USER32(?,?), ref: 0072E504
                                                                                                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 00732312
                                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000), ref: 00732319
                                                                                                                                                                                                                                                      • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00732355
                                                                                                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00732381
                                                                                                                                                                                                                                                      • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 007323DF
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2387181109-0
                                                                                                                                                                                                                                                      • Opcode ID: f0729118a9f945d721de8068f603b6b7d4abff0a82bad06946c567e7979984f5
                                                                                                                                                                                                                                                      • Instruction ID: 3512cc9cd91f7b65ca3f18a6f16afb53f7157a72405791a8fac526f1d8c58d90
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f0729118a9f945d721de8068f603b6b7d4abff0a82bad06946c567e7979984f5
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F3310172505315AFE721DF18C848F9BBBA9FF85310F00491AF98597182DB38EA09CB96
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006B9CB3: _wcslen.LIBCMT ref: 006B9CBD
                                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00729B78
                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00729C8B
                                                                                                                                                                                                                                                        • Part of subcall function 00723874: GetInputState.USER32 ref: 007238CB
                                                                                                                                                                                                                                                        • Part of subcall function 00723874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00723966
                                                                                                                                                                                                                                                      • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00729BA8
                                                                                                                                                                                                                                                      • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00729C75
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                                                                                                                                                                                                      • String ID: *.*
                                                                                                                                                                                                                                                      • API String ID: 1972594611-438819550
                                                                                                                                                                                                                                                      • Opcode ID: 4c36812e2a580e50b27d9996341f3f6829c1fe2a31ab6f5aebe1af458d6bfc6b
                                                                                                                                                                                                                                                      • Instruction ID: 9560332bfaa0a3b1687f1bdca25240bb0d0d3d8a321458d2573c22754e719f06
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4c36812e2a580e50b27d9996341f3f6829c1fe2a31ab6f5aebe1af458d6bfc6b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9A41A3B190021AAFDF55DF74D885AEEBBF9FF05310F24405AE905A2191EB349E84CF64
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 006C9BB2
                                                                                                                                                                                                                                                      • DefDlgProcW.USER32(?,?,?,?,?), ref: 006C9A4E
                                                                                                                                                                                                                                                      • GetSysColor.USER32(0000000F), ref: 006C9B23
                                                                                                                                                                                                                                                      • SetBkColor.GDI32(?,00000000), ref: 006C9B36
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Color$LongProcWindow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3131106179-0
                                                                                                                                                                                                                                                      • Opcode ID: 4146038bdee27e078b8d849a9f1390a20632bfd1b1a585614324c8ed990c41c6
                                                                                                                                                                                                                                                      • Instruction ID: da77c17d9d8db5212e1bd27eb4e179e50a3d68cfdd495407fd94b496ffb67b48
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4146038bdee27e078b8d849a9f1390a20632bfd1b1a585614324c8ed990c41c6
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C5A10871608444FEE729AA6C8C9DFBB369EEB42350F25420DF502D67D1CA2DAD02D376
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 0073304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0073307A
                                                                                                                                                                                                                                                        • Part of subcall function 0073304E: _wcslen.LIBCMT ref: 0073309B
                                                                                                                                                                                                                                                      • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0073185D
                                                                                                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 00731884
                                                                                                                                                                                                                                                      • bind.WSOCK32(00000000,?,00000010), ref: 007318DB
                                                                                                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 007318E6
                                                                                                                                                                                                                                                      • closesocket.WSOCK32(00000000), ref: 00731915
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1601658205-0
                                                                                                                                                                                                                                                      • Opcode ID: b142601d7d22f7d176f2b10fd44888fa7b49adbcc2a9b23d683e02f79747cb42
                                                                                                                                                                                                                                                      • Instruction ID: 83703a0b476061a0d8a18b7e44168eb43f83d7be9d75713e4548b14d6a951222
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b142601d7d22f7d176f2b10fd44888fa7b49adbcc2a9b23d683e02f79747cb42
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 355192B5A002109FEB50AF24C886F6A77EAAB45718F48809CF9055F293C775AD418BA5
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 292994002-0
                                                                                                                                                                                                                                                      • Opcode ID: ea4376de755b4f4c303cf7ca1d0cecadc246a1276e44dc9f7318839a76d11581
                                                                                                                                                                                                                                                      • Instruction ID: 84fa416ba25abf5f5708850cbac145ae4e6379f27782d77c8f365eb1a3adb931
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ea4376de755b4f4c303cf7ca1d0cecadc246a1276e44dc9f7318839a76d11581
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: EE21F6317412009FD3219F1ACC84B6A7BE5EF85324B59C059E8458B352C779DC82CBA4
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                                                                                                                                                                                                                      • API String ID: 0-1546025612
                                                                                                                                                                                                                                                      • Opcode ID: 383e8c9a6dd23d6c182c27a8ad3f6c30dbdeacadd20118a0392763ff88c168fc
                                                                                                                                                                                                                                                      • Instruction ID: 07eb6125633e5bc8f4a421cc444528d053cec77f622fd03ab0c4f8cdaa371118
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 383e8c9a6dd23d6c182c27a8ad3f6c30dbdeacadd20118a0392763ff88c168fc
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 28A25DB1A0021ACFDF24CF58C9507FDB7B6BB54314F2481A9EA16A7345EB709D81CB90
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(?,?,?,00000000), ref: 007182AA
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: lstrlen
                                                                                                                                                                                                                                                      • String ID: ($tbw$|
                                                                                                                                                                                                                                                      • API String ID: 1659193697-2577085510
                                                                                                                                                                                                                                                      • Opcode ID: 37b34c1aac8e0cfb13a58f054441f77d86cd87b53cf05fbbce76c45656524598
                                                                                                                                                                                                                                                      • Instruction ID: 9f5b3f96136263a7e17a55a47bca1ddb61e10e8c4d4b11df687c532bc26dc27c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 37b34c1aac8e0cfb13a58f054441f77d86cd87b53cf05fbbce76c45656524598
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 00323774A006059FCB68CF59C081AAAB7F1FF48710B15C56EE49ADB3A1EB74E981CB44
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 0071AAAC
                                                                                                                                                                                                                                                      • SetKeyboardState.USER32(00000080), ref: 0071AAC8
                                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 0071AB36
                                                                                                                                                                                                                                                      • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 0071AB88
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: KeyboardState$InputMessagePostSend
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 432972143-0
                                                                                                                                                                                                                                                      • Opcode ID: 3829b83ca7c53ffd7df9c51ac072b7cd668ba07d6f196a03047143c45cf54240
                                                                                                                                                                                                                                                      • Instruction ID: 2ab23c2a36e7588c87a942f69a5edefbd7b8504aa9a7092cb0f141641370f8bb
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3829b83ca7c53ffd7df9c51ac072b7cd668ba07d6f196a03047143c45cf54240
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 643128B0A46288BEFF31CA6CCC05BFA7BA6AF45310F04821AF181521D1D37D89C5C762
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006EBB7F
                                                                                                                                                                                                                                                        • Part of subcall function 006E29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,006ED7D1,00000000,00000000,00000000,00000000,?,006ED7F8,00000000,00000007,00000000,?,006EDBF5,00000000), ref: 006E29DE
                                                                                                                                                                                                                                                        • Part of subcall function 006E29C8: GetLastError.KERNEL32(00000000,?,006ED7D1,00000000,00000000,00000000,00000000,?,006ED7F8,00000000,00000007,00000000,?,006EDBF5,00000000,00000000), ref: 006E29F0
                                                                                                                                                                                                                                                      • GetTimeZoneInformation.KERNEL32 ref: 006EBB91
                                                                                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,?,0078121C,000000FF,?,0000003F,?,?), ref: 006EBC09
                                                                                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,?,00781270,000000FF,?,0000003F,?,?,?,0078121C,000000FF,?,0000003F,?,?), ref: 006EBC36
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 806657224-0
                                                                                                                                                                                                                                                      • Opcode ID: 03b1a4a818219441acc4d6dbe8f01ca0d8e3bccf722ba89bf1a636408e2ad190
                                                                                                                                                                                                                                                      • Instruction ID: d74c8f5d4e20113c0f120781693784a85c4aac624f128e9814bd4b4d6ef3f13c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 03b1a4a818219441acc4d6dbe8f01ca0d8e3bccf722ba89bf1a636408e2ad190
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3B31E170A49385DFCB11DF6ADC8186EBBBAFF45710B2492AAE050DB2A1C7349D02CB54
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • InternetReadFile.WININET(?,?,00000400,?), ref: 0072CE89
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,00000000), ref: 0072CEEA
                                                                                                                                                                                                                                                      • SetEvent.KERNEL32(?,?,00000000), ref: 0072CEFE
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorEventFileInternetLastRead
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 234945975-0
                                                                                                                                                                                                                                                      • Opcode ID: a542eeb30abede9f76b4e9d38ffd7c02dee7bc9a2f83fc2ce7a80fbd463b2ef2
                                                                                                                                                                                                                                                      • Instruction ID: 1b90444fd89b2a7eefbc99ddb228762eccd00eb30cfee8ef02fe6e1e40732076
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a542eeb30abede9f76b4e9d38ffd7c02dee7bc9a2f83fc2ce7a80fbd463b2ef2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E821CFB29007159BEB22DFA5E948BAB77FCEB20358F10841EE546D2151E778EE048B54
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00725CC1
                                                                                                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00725D17
                                                                                                                                                                                                                                                      • FindClose.KERNEL32(?), ref: 00725D5F
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Find$File$CloseFirstNext
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3541575487-0
                                                                                                                                                                                                                                                      • Opcode ID: 5b3c7cc02bdf548174a2942659554784ea535b12a51c894b3a90bebed1cf3569
                                                                                                                                                                                                                                                      • Instruction ID: edbf627bcbed2807f3aefd32075d32dd5b35fee114c844fa55affd96c9346234
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5b3c7cc02bdf548174a2942659554784ea535b12a51c894b3a90bebed1cf3569
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B2519774604A019FC714CF28D4D4A9AB7E4FF4A324F14855EE99A8B3A2DB34ED44CFA1
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • IsDebuggerPresent.KERNEL32 ref: 006E271A
                                                                                                                                                                                                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 006E2724
                                                                                                                                                                                                                                                      • UnhandledExceptionFilter.KERNEL32(?), ref: 006E2731
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3906539128-0
                                                                                                                                                                                                                                                      • Opcode ID: 9f7ad0d01c2f920be7cc6f39f1122b61a6a6f0a21db6854dcff36d8f45aaf927
                                                                                                                                                                                                                                                      • Instruction ID: 814eeb4c94997fd0f57918bc82f8690ebf07c567df5ecb39f9cedf70fd9899d9
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9f7ad0d01c2f920be7cc6f39f1122b61a6a6f0a21db6854dcff36d8f45aaf927
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A031C4749013199BCB61DF65DC887DCBBB9AF08310F5041EAE40CA6261E7749F818F49
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000001), ref: 007251DA
                                                                                                                                                                                                                                                      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00725238
                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000000), ref: 007252A1
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorMode$DiskFreeSpace
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1682464887-0
                                                                                                                                                                                                                                                      • Opcode ID: 4bf3da67e0d95360b52ff135b0e7a9eab23ab398fc7630795cf483f157d27e0b
                                                                                                                                                                                                                                                      • Instruction ID: 81fd925617397a3503cc495a9bffdb567d7efd0f4cd994ee59c74cad506821ca
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4bf3da67e0d95360b52ff135b0e7a9eab23ab398fc7630795cf483f157d27e0b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B0317CB5A00518DFDB00DF54D884EADBBF5FF49314F188099E805AB3A2DB35E945CBA0
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006CFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 006D0668
                                                                                                                                                                                                                                                        • Part of subcall function 006CFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 006D0685
                                                                                                                                                                                                                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0071170D
                                                                                                                                                                                                                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0071173A
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 0071174A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 577356006-0
                                                                                                                                                                                                                                                      • Opcode ID: d0c086d7a195eff6137ef4ecd9f3dc2dd9b6ecd07a8a2d729dce139348800ad7
                                                                                                                                                                                                                                                      • Instruction ID: 8126d4bae5b14fa72077205c6565cb0725793453e3e30da7f2fc82f77e3e2434
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d0c086d7a195eff6137ef4ecd9f3dc2dd9b6ecd07a8a2d729dce139348800ad7
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2F11CEB2400304AFD718AF58DC86EAAB7BAEF04714B20852EE05657291EB74BC818B24
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0071D608
                                                                                                                                                                                                                                                      • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 0071D645
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0071D650
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseControlCreateDeviceFileHandle
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 33631002-0
                                                                                                                                                                                                                                                      • Opcode ID: 179e3d1d6ed3a1c199a0ea4427b552ab91d826cb947ff6e0bd82a3d14cd3be42
                                                                                                                                                                                                                                                      • Instruction ID: 09e43db6da9390cf8b06da3fb949c57a9fb9d147b24c0df9637f95c9768a2a51
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 179e3d1d6ed3a1c199a0ea4427b552ab91d826cb947ff6e0bd82a3d14cd3be42
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 98117C75E01228BBDB208F989C44FAFBBBCEB45B50F108112F904E7290C2B45A018BA1
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0071168C
                                                                                                                                                                                                                                                      • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 007116A1
                                                                                                                                                                                                                                                      • FreeSid.ADVAPI32(?), ref: 007116B1
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3429775523-0
                                                                                                                                                                                                                                                      • Opcode ID: e1b044efc2f3941e61e4d68a6a0e3ff3c966b4256fc077f30f02cb3b7521457a
                                                                                                                                                                                                                                                      • Instruction ID: 8596e7d97d324cc649b0c4b2376c310764446c292afb98b7908e24dfdcba5098
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e1b044efc2f3941e61e4d68a6a0e3ff3c966b4256fc077f30f02cb3b7521457a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DBF04475A41308FBDB00CFE48C89AAEBBBCEB08200F408861E600E2190E738AA448A54
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetUserNameW.ADVAPI32(?,?), ref: 0070D28C
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: NameUser
                                                                                                                                                                                                                                                      • String ID: X64
                                                                                                                                                                                                                                                      • API String ID: 2645101109-893830106
                                                                                                                                                                                                                                                      • Opcode ID: 06ab71ac291041bb28a004203b7ad4ff54b4e22724839a334e9a9708f2e80cff
                                                                                                                                                                                                                                                      • Instruction ID: 47568380fd5f95a1e4c348a7bd5d588b3b5f9c5fe3d98f3b9f11f7d7bf834bbf
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 06ab71ac291041bb28a004203b7ad4ff54b4e22724839a334e9a9708f2e80cff
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B0D0C9B480211DEBCB90CB90DC88DE9B3BCBB04315F104256F106A2040D73495498F10
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                                                                                                                                                                                      • Instruction ID: ba6482a0914f35a72385902a6590db340da1e063692a6cb04c091aafe7746777
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E302FC71E0111A9BDF14CFA9C9806EDFBF2EF48324F25426AD919EB384D731A941CB94
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: Variable is not of type 'Object'.$p#x
                                                                                                                                                                                                                                                      • API String ID: 0-252530211
                                                                                                                                                                                                                                                      • Opcode ID: 8d361d60ee4643bbf922781e6e1afc207b25820b3c3a06d831508865680e4319
                                                                                                                                                                                                                                                      • Instruction ID: 8d7ba9665ed8d291f732b857ce0b26de4b416fc055e884dac1fc0972c2b39dbf
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8d361d60ee4643bbf922781e6e1afc207b25820b3c3a06d831508865680e4319
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 52329EB4900218DBDF14DF94C895BFDB7B6FF04324F148169E806AB292D775AE86CB60
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00726918
                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00726961
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Find$CloseFileFirst
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2295610775-0
                                                                                                                                                                                                                                                      • Opcode ID: 5ba35c412cd66e0fe2d8ae41f19ac93a61c97a7e0a74a7ffa6aad939444114c9
                                                                                                                                                                                                                                                      • Instruction ID: 8a6fcaf71db056d09f3f3abbee5607891cbf03eafadee08bf6c4cc3a89d6a96c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5ba35c412cd66e0fe2d8ae41f19ac93a61c97a7e0a74a7ffa6aad939444114c9
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B811D0756042109FD710CF29D484A26BBE5FF85328F04C69EF4A98F2A2CB74EC45CB90
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00734891,?,?,00000035,?), ref: 007237E4
                                                                                                                                                                                                                                                      • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00734891,?,?,00000035,?), ref: 007237F4
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorFormatLastMessage
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3479602957-0
                                                                                                                                                                                                                                                      • Opcode ID: 2eaf3bb2cc03cb0ec3930e69b012e92e8029b5c0e737278afb2602a955c4105b
                                                                                                                                                                                                                                                      • Instruction ID: 7f8989cde01dab1a10df54ff8cccbf799727805d3d1c9f7506ce3dc71ae012e5
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2eaf3bb2cc03cb0ec3930e69b012e92e8029b5c0e737278afb2602a955c4105b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0DF05CB06012282BDB5017655C4CFEB3AAEEFC5760F000225F104D2280C6744900C7B0
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 0071B25D
                                                                                                                                                                                                                                                      • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 0071B270
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: InputSendkeybd_event
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3536248340-0
                                                                                                                                                                                                                                                      • Opcode ID: 1b8cde4e4d722622d732fdf5f7b6e46cf3e06e8f3580440404906b4c647ecfac
                                                                                                                                                                                                                                                      • Instruction ID: b55a1d11527a5298004b0e96d856fcc30cda95f938a956eb09b81387ba9da2d6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1b8cde4e4d722622d732fdf5f7b6e46cf3e06e8f3580440404906b4c647ecfac
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B6F06D7480424DABDB068FA4C805BEE7BB4FF08305F00800AF951A5191C37D82159F94
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,007111FC), ref: 007110D4
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,007111FC), ref: 007110E9
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AdjustCloseHandlePrivilegesToken
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 81990902-0
                                                                                                                                                                                                                                                      • Opcode ID: be5364f5c152b8a3f482bb5327dcb86a5f297ee679e2098372f52dbd87f01863
                                                                                                                                                                                                                                                      • Instruction ID: 6b49432ce1987a4e9fe685517c981c6cecaee956c2d9dffd9d04742db601ae85
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: be5364f5c152b8a3f482bb5327dcb86a5f297ee679e2098372f52dbd87f01863
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 31E04F32005610AFE7662B11FC05F7377AAEF04310B10C82EF5A6804B1DB62AC90DB14
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,006E6766,?,?,00000008,?,?,006EFEFE,00000000), ref: 006E6998
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ExceptionRaise
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3997070919-0
                                                                                                                                                                                                                                                      • Opcode ID: 3562a59dda73877933fff75c3a1b82e1aadcc9b3552ee9a343915c9e047ae197
                                                                                                                                                                                                                                                      • Instruction ID: 23433e5bf26c943e6f9fdec255de8da193e14d04efd7db2f21fa539901c302dc
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3562a59dda73877933fff75c3a1b82e1aadcc9b3552ee9a343915c9e047ae197
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C2B16D316117498FD715CF29C486BA57BE1FF153A4F258658F89ACF2A2C335E982CB40
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 0-3916222277
                                                                                                                                                                                                                                                      • Opcode ID: 950547d4cb66c071a4366d4b86dc0cb24eff1ff11339d28bc92b56810ebf4a61
                                                                                                                                                                                                                                                      • Instruction ID: 06c90ddea6b681634d660b308a643aff90cd66a05308624740f6063c8821965b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 950547d4cb66c071a4366d4b86dc0cb24eff1ff11339d28bc92b56810ebf4a61
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 25124E71900229DBCB54CF58C881BFEB7F5FF48710F14819AE849EB295EB749A81CB91
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • BlockInput.USER32(00000001), ref: 0072EABD
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: BlockInput
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3456056419-0
                                                                                                                                                                                                                                                      • Opcode ID: 4374ae5dac79cd325a9861de477388d3c11b23943be615822834a18791104d7c
                                                                                                                                                                                                                                                      • Instruction ID: 3fb72e1547a58076f3ccf8394803368b1c8caacbdbe9702918bfc0580804a6ee
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4374ae5dac79cd325a9861de477388d3c11b23943be615822834a18791104d7c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 89E01A762002149FC750EF59E804EAAB7EDAFA9760F00C41AFC4AC7251DBB4A8808B95
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,006D03EE), ref: 006D09DA
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ExceptionFilterUnhandled
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3192549508-0
                                                                                                                                                                                                                                                      • Opcode ID: 887f4d0f06f38624a7fe2b039af4bcc6a53d4f5330839db18252e19a44f76344
                                                                                                                                                                                                                                                      • Instruction ID: 0d16efc7c614580e29db49751e31d28518345223cea0a022faf3edb7c8877bc5
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 887f4d0f06f38624a7fe2b039af4bcc6a53d4f5330839db18252e19a44f76344
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash:
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: 0
                                                                                                                                                                                                                                                      • API String ID: 0-4108050209
                                                                                                                                                                                                                                                      • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                                                                                                                                                                                      • Instruction ID: 5bd0282c0598b3d0ff134718be5c4679c4c0f4729af602ab0698511c8814276b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 58515972E0C6455BDB384568886E7FE63979B52300F18052FD886DB382FA15DE02F39B
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: 0&x
                                                                                                                                                                                                                                                      • API String ID: 0-1177175720
                                                                                                                                                                                                                                                      • Opcode ID: fd69e077845bf8272543042dddd656c960545d16f9e99e01dbf392e52bab06f7
                                                                                                                                                                                                                                                      • Instruction ID: 4e70a03326538e067ea49febe163b988351a705dffe92302a4dc4c67e3292d57
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: fd69e077845bf8272543042dddd656c960545d16f9e99e01dbf392e52bab06f7
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5221A5327606118BD728CE79C82267A73E5A754310F25862EE4A7C77D1DE3AE905CB84
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: c67cebecee14de111356e3f8825aaec3340137b09036ad37240fc7e215a33b76
                                                                                                                                                                                                                                                      • Instruction ID: a3cf9fb5aeb16e12d853599f4b5192383d4685a4234c658d2077b6e3edf011be
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c67cebecee14de111356e3f8825aaec3340137b09036ad37240fc7e215a33b76
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A4325921D2AF814DD7239635DC22375629AAFB73C6F14C737F81AB5AA6EF69C4834100
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: c7a9c4290a8394d58c448e3f191ff58c666129456894572eee9cf1b3c25a005f
                                                                                                                                                                                                                                                      • Instruction ID: a389bff8edf732eb74ee711e36a6800dca433864c9cd238cd9f2643cb488af38
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c7a9c4290a8394d58c448e3f191ff58c666129456894572eee9cf1b3c25a005f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 90321471A00105CBDF2ACB28C494BBD77E2EB45314F28836AE84ACB2D1E638DD81DB51
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 6050f17a20014e821ff740165e073343bf44e415bd5d4ee75d62a3fd5a2ff6a7
                                                                                                                                                                                                                                                      • Instruction ID: ae9b3c983813cab4273af8846dd805736d2996d1d69e59b99bde8ed32cefb50b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6050f17a20014e821ff740165e073343bf44e415bd5d4ee75d62a3fd5a2ff6a7
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 25228DB0A0460A9FDF14DF68C881AEEB7F7FF44300F244629E916A7291EB35AD51CB54
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 92c6f158844e3c971a8e5e2fbb377b5b311212de3ff8158b6e4bd247edb2ce69
                                                                                                                                                                                                                                                      • Instruction ID: e991f8463ecfe3f7fbad13a0d6204121fd62a938a56db0011e377cde42af1079
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 92c6f158844e3c971a8e5e2fbb377b5b311212de3ff8158b6e4bd247edb2ce69
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CA02A6B1E00209EBDB14DF54D981AFDBBB3FF44300F108169E9169B3A1EB35AA51CB95
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: eb8389ed199f4aece0de8e35e89650dbefbb7c588be00f30e3c5abcceee866c6
                                                                                                                                                                                                                                                      • Instruction ID: 5c4acb1612e4f5bb712df15e6574a9df37ab748028bee1ed5971372001caed85
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: eb8389ed199f4aece0de8e35e89650dbefbb7c588be00f30e3c5abcceee866c6
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F3B1F020E2AF404DD72396398831336B65CAFBB6D6F91D71BFC2674D22EB2686834144
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                                                                                                                                                                      • Instruction ID: 374a109f59d7465bd3d0abd7ef26b61add25a619e134f67c27c16c5c1577e2be
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F2918772A080A35ADB29463A85344BDFFE35E933A131A079FD4F2CE3C5EE548955D620
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                                                                                                                                                                      • Instruction ID: b7d2f0b75def13c2dba50dd4e165ec10f33a5c255d49dbbba3a42b728b7f7249
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DF917972A080A349D7294339897447EFFE35AA23A131A479FD5F2CF3C5EE24C555D620
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                                                                                                                                                                      • Instruction ID: 87fe170d9fa0c98d70f40e8240ee757023b7733139f58a11d9bebd0ffc180823
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 14917372A090A35ADB2D427A857407DFFE25A933A131E079FD4F2CE3C1FD648655D620
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 2c7efed43c4262cee8ec11c5d07872d39add11ec2e69aa28b7e4005193b4e044
                                                                                                                                                                                                                                                      • Instruction ID: 5f60fd391f5177e8a7e76a2787eaa1f6309e7aaf75a1ee40fb94432f1524a904
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2c7efed43c4262cee8ec11c5d07872d39add11ec2e69aa28b7e4005193b4e044
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 94615871E0874A5ADA749E288DA6BFE2397DF51704F18091FE842DB381F611AE42C35B
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 366fd7891f21154c3d22fa8206417c0268cb3c7e1e5f4a51b8d6e4d874d52e6c
                                                                                                                                                                                                                                                      • Instruction ID: f9a8536908eea3b2d87c6a3c486563ed91d98344d992e2da2d6b1f5ffaa8aa69
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 366fd7891f21154c3d22fa8206417c0268cb3c7e1e5f4a51b8d6e4d874d52e6c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 88614971E0870956DE385A289856BFF6397DF42704F14095FE943DB381FA12ED42825B
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                                                                                                                                                                      • Instruction ID: e279c83ea72d026b18385573a8381f6e4b189b710267c5f53ffb6e03f7ed2d75
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1E816672E090A31ADB6D8279853447EFFE35A933A131A079FD4F2CE3D1EE648554E620
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 00732B30
                                                                                                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 00732B43
                                                                                                                                                                                                                                                      • DestroyWindow.USER32 ref: 00732B52
                                                                                                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 00732B6D
                                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000), ref: 00732B74
                                                                                                                                                                                                                                                      • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00732CA3
                                                                                                                                                                                                                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00732CB1
                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00732CF8
                                                                                                                                                                                                                                                      • GetClientRect.USER32(00000000,?), ref: 00732D04
                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00732D40
                                                                                                                                                                                                                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00732D62
                                                                                                                                                                                                                                                      • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00732D75
                                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00732D80
                                                                                                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 00732D89
                                                                                                                                                                                                                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00732D98
                                                                                                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00732DA1
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00732DA8
                                                                                                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00732DB3
                                                                                                                                                                                                                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00732DC5
                                                                                                                                                                                                                                                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,0074FC38,00000000), ref: 00732DDB
                                                                                                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00732DEB
                                                                                                                                                                                                                                                      • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00732E11
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00732E30
                                                                                                                                                                                                                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00732E52
                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0073303F
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                                                                                                                                                                                                      • String ID: $AutoIt v3$DISPLAY$static
                                                                                                                                                                                                                                                      • API String ID: 2211948467-2373415609
                                                                                                                                                                                                                                                      • Opcode ID: 0b598e94cbc3b9a268786e39ff4a040f912d8569a60ee7de39987b9893db53d6
                                                                                                                                                                                                                                                      • Instruction ID: fe0129f05b89d1d2a1db663fe24986f8b8f689339a44bb3381aec6e53c7d7668
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0b598e94cbc3b9a268786e39ff4a040f912d8569a60ee7de39987b9893db53d6
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AB029EB5500214EFDB15DF64CC89EAE7BB9FF49310F108119F915AB2A2DB78AD01CB64
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SetTextColor.GDI32(?,00000000), ref: 0074712F
                                                                                                                                                                                                                                                      • GetSysColorBrush.USER32(0000000F), ref: 00747160
                                                                                                                                                                                                                                                      • GetSysColor.USER32(0000000F), ref: 0074716C
                                                                                                                                                                                                                                                      • SetBkColor.GDI32(?,000000FF), ref: 00747186
                                                                                                                                                                                                                                                      • SelectObject.GDI32(?,?), ref: 00747195
                                                                                                                                                                                                                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 007471C0
                                                                                                                                                                                                                                                      • GetSysColor.USER32(00000010), ref: 007471C8
                                                                                                                                                                                                                                                      • CreateSolidBrush.GDI32(00000000), ref: 007471CF
                                                                                                                                                                                                                                                      • FrameRect.USER32(?,?,00000000), ref: 007471DE
                                                                                                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 007471E5
                                                                                                                                                                                                                                                      • InflateRect.USER32(?,000000FE,000000FE), ref: 00747230
                                                                                                                                                                                                                                                      • FillRect.USER32(?,?,?), ref: 00747262
                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00747284
                                                                                                                                                                                                                                                        • Part of subcall function 007473E8: GetSysColor.USER32(00000012), ref: 00747421
                                                                                                                                                                                                                                                        • Part of subcall function 007473E8: SetTextColor.GDI32(?,?), ref: 00747425
                                                                                                                                                                                                                                                        • Part of subcall function 007473E8: GetSysColorBrush.USER32(0000000F), ref: 0074743B
                                                                                                                                                                                                                                                        • Part of subcall function 007473E8: GetSysColor.USER32(0000000F), ref: 00747446
                                                                                                                                                                                                                                                        • Part of subcall function 007473E8: GetSysColor.USER32(00000011), ref: 00747463
                                                                                                                                                                                                                                                        • Part of subcall function 007473E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00747471
                                                                                                                                                                                                                                                        • Part of subcall function 007473E8: SelectObject.GDI32(?,00000000), ref: 00747482
                                                                                                                                                                                                                                                        • Part of subcall function 007473E8: SetBkColor.GDI32(?,00000000), ref: 0074748B
                                                                                                                                                                                                                                                        • Part of subcall function 007473E8: SelectObject.GDI32(?,?), ref: 00747498
                                                                                                                                                                                                                                                        • Part of subcall function 007473E8: InflateRect.USER32(?,000000FF,000000FF), ref: 007474B7
                                                                                                                                                                                                                                                        • Part of subcall function 007473E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 007474CE
                                                                                                                                                                                                                                                        • Part of subcall function 007473E8: GetWindowLongW.USER32(00000000,000000F0), ref: 007474DB
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 4124339563-0
                                                                                                                                                                                                                                                      • Opcode ID: 291ce3dcece53efabdf5eca0e950e8d55fb523f999aa9cf653b2f93c3e392d02
                                                                                                                                                                                                                                                      • Instruction ID: 57ccd7d2fc992440ea5d36bb209d1ba2ac751739dd93f272d21252d646723fb5
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 291ce3dcece53efabdf5eca0e950e8d55fb523f999aa9cf653b2f93c3e392d02
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D6A1C076009301FFD7569F60DC48E6BBBB9FB8A320F104A1AF962961E1D778E800CB55
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • DestroyWindow.USER32(?,?), ref: 006C8E14
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001308,?,00000000), ref: 00706AC5
                                                                                                                                                                                                                                                      • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00706AFE
                                                                                                                                                                                                                                                      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00706F43
                                                                                                                                                                                                                                                        • Part of subcall function 006C8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,006C8BE8,?,00000000,?,?,?,?,006C8BBA,00000000,?), ref: 006C8FC5
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001053), ref: 00706F7F
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00706F96
                                                                                                                                                                                                                                                      • ImageList_Destroy.COMCTL32(00000000,?), ref: 00706FAC
                                                                                                                                                                                                                                                      • ImageList_Destroy.COMCTL32(00000000,?), ref: 00706FB7
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                                                                                                                                                                                                                      • String ID: 0
                                                                                                                                                                                                                                                      • API String ID: 2760611726-4108050209
                                                                                                                                                                                                                                                      • Opcode ID: a3befec17d606097f88b2a6d635c7716eec795b60c3d883a62fe87c0dbd2f3a3
                                                                                                                                                                                                                                                      • Instruction ID: 13da66988524c8efefc5826f426178d1ede5f892aacf9eb2e5f131659c61d45f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a3befec17d606097f88b2a6d635c7716eec795b60c3d883a62fe87c0dbd2f3a3
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0112AE74201201DFDB25CF24C864BBAB7E6FB49300F64866DE595CB2A1CB39EC62CB55
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • DestroyWindow.USER32(00000000), ref: 0073273E
                                                                                                                                                                                                                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0073286A
                                                                                                                                                                                                                                                      • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 007328A9
                                                                                                                                                                                                                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 007328B9
                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00732900
                                                                                                                                                                                                                                                      • GetClientRect.USER32(00000000,?), ref: 0073290C
                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00732955
                                                                                                                                                                                                                                                      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00732964
                                                                                                                                                                                                                                                      • GetStockObject.GDI32(00000011), ref: 00732974
                                                                                                                                                                                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00732978
                                                                                                                                                                                                                                                      • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00732988
                                                                                                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00732991
                                                                                                                                                                                                                                                      • DeleteDC.GDI32(00000000), ref: 0073299A
                                                                                                                                                                                                                                                      • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 007329C6
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000030,00000000,00000001), ref: 007329DD
                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00732A1D
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00732A31
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000404,00000001,00000000), ref: 00732A42
                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00732A77
                                                                                                                                                                                                                                                      • GetStockObject.GDI32(00000011), ref: 00732A82
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00732A8D
                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00732A97
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                                                                                                                                                                                      • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                                                                                                                                                                                      • API String ID: 2910397461-517079104
                                                                                                                                                                                                                                                      • Opcode ID: 9fe4ca6f7733921fa97fabbc5162b3484778d9fe7be8e42701f0e3605ac66b8b
                                                                                                                                                                                                                                                      • Instruction ID: 1a97816b6bf96f513694ba03f9a35408f9a2d3dd5f186288d4bdd24a37aa1156
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9fe4ca6f7733921fa97fabbc5162b3484778d9fe7be8e42701f0e3605ac66b8b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 17B19FB5A40215AFEB10CF68CC49FAE7BA9FB05710F108515FA14E7291D778ED41CBA8
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000001), ref: 00724AED
                                                                                                                                                                                                                                                      • GetDriveTypeW.KERNEL32(?,0074CB68,?,\\.\,0074CC08), ref: 00724BCA
                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000000,0074CB68,?,\\.\,0074CC08), ref: 00724D36
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorMode$DriveType
                                                                                                                                                                                                                                                      • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                                                                                                                                                                                      • API String ID: 2907320926-4222207086
                                                                                                                                                                                                                                                      • Opcode ID: 99c962346cae2fd4416825505e6e99d527da85e0d9ee952468a26cf4be54bbbd
                                                                                                                                                                                                                                                      • Instruction ID: 8527ecaae412f3bee853044431c2336646bf9f9a4507313c47d8651a96d49623
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 99c962346cae2fd4416825505e6e99d527da85e0d9ee952468a26cf4be54bbbd
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6661D3B0701615DBCF15DF28DA919B877F1EB04380B24841AF80AAB695DB3DEDC1DB61
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetSysColor.USER32(00000012), ref: 00747421
                                                                                                                                                                                                                                                      • SetTextColor.GDI32(?,?), ref: 00747425
                                                                                                                                                                                                                                                      • GetSysColorBrush.USER32(0000000F), ref: 0074743B
                                                                                                                                                                                                                                                      • GetSysColor.USER32(0000000F), ref: 00747446
                                                                                                                                                                                                                                                      • CreateSolidBrush.GDI32(?), ref: 0074744B
                                                                                                                                                                                                                                                      • GetSysColor.USER32(00000011), ref: 00747463
                                                                                                                                                                                                                                                      • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00747471
                                                                                                                                                                                                                                                      • SelectObject.GDI32(?,00000000), ref: 00747482
                                                                                                                                                                                                                                                      • SetBkColor.GDI32(?,00000000), ref: 0074748B
                                                                                                                                                                                                                                                      • SelectObject.GDI32(?,?), ref: 00747498
                                                                                                                                                                                                                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 007474B7
                                                                                                                                                                                                                                                      • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 007474CE
                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 007474DB
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0074752A
                                                                                                                                                                                                                                                      • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00747554
                                                                                                                                                                                                                                                      • InflateRect.USER32(?,000000FD,000000FD), ref: 00747572
                                                                                                                                                                                                                                                      • DrawFocusRect.USER32(?,?), ref: 0074757D
                                                                                                                                                                                                                                                      • GetSysColor.USER32(00000011), ref: 0074758E
                                                                                                                                                                                                                                                      • SetTextColor.GDI32(?,00000000), ref: 00747596
                                                                                                                                                                                                                                                      • DrawTextW.USER32(?,007470F5,000000FF,?,00000000), ref: 007475A8
                                                                                                                                                                                                                                                      • SelectObject.GDI32(?,?), ref: 007475BF
                                                                                                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 007475CA
                                                                                                                                                                                                                                                      • SelectObject.GDI32(?,?), ref: 007475D0
                                                                                                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 007475D5
                                                                                                                                                                                                                                                      • SetTextColor.GDI32(?,?), ref: 007475DB
                                                                                                                                                                                                                                                      • SetBkColor.GDI32(?,?), ref: 007475E5
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1996641542-0
                                                                                                                                                                                                                                                      • Opcode ID: e1f364191db65419c000d0927ee4295fca45a79c1d2e4a87fd8f37fe2925855d
                                                                                                                                                                                                                                                      • Instruction ID: e0bba3766f3862103d3a66cb267ab6595fe4a35645fe4f23d66c6d4743bebde0
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e1f364191db65419c000d0927ee4295fca45a79c1d2e4a87fd8f37fe2925855d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 24619F76901218AFDF059FA4DC49EEEBFB9EB09320F118116F911BB2A1D7789940CF90
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00741128
                                                                                                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 0074113D
                                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000), ref: 00741144
                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00741199
                                                                                                                                                                                                                                                      • DestroyWindow.USER32(?), ref: 007411B9
                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 007411ED
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0074120B
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0074121D
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000421,?,?), ref: 00741232
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00741245
                                                                                                                                                                                                                                                      • IsWindowVisible.USER32(00000000), ref: 007412A1
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 007412BC
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 007412D0
                                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000,?), ref: 007412E8
                                                                                                                                                                                                                                                      • MonitorFromPoint.USER32(?,?,00000002), ref: 0074130E
                                                                                                                                                                                                                                                      • GetMonitorInfoW.USER32(00000000,?), ref: 00741328
                                                                                                                                                                                                                                                      • CopyRect.USER32(?,?), ref: 0074133F
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000412,00000000), ref: 007413AA
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                                                                                                                                                                                      • String ID: ($0$tooltips_class32
                                                                                                                                                                                                                                                      • API String ID: 698492251-4156429822
                                                                                                                                                                                                                                                      • Opcode ID: 0998a256da21b74def0c21edab4ab9231af89d29cedbc6c27b03284f234ad4bd
                                                                                                                                                                                                                                                      • Instruction ID: f488d50898e1ddd54288d5471e65cc42b8cfd55c0b63590034fdfcee00783b39
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0998a256da21b74def0c21edab4ab9231af89d29cedbc6c27b03284f234ad4bd
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FCB1BC71604340AFD750EF24C884BABBBE5FF85300F40891DF9999B2A1C775E884CBA6
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 006C8968
                                                                                                                                                                                                                                                      • GetSystemMetrics.USER32(00000007), ref: 006C8970
                                                                                                                                                                                                                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 006C899B
                                                                                                                                                                                                                                                      • GetSystemMetrics.USER32(00000008), ref: 006C89A3
                                                                                                                                                                                                                                                      • GetSystemMetrics.USER32(00000004), ref: 006C89C8
                                                                                                                                                                                                                                                      • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 006C89E5
                                                                                                                                                                                                                                                      • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 006C89F5
                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 006C8A28
                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 006C8A3C
                                                                                                                                                                                                                                                      • GetClientRect.USER32(00000000,000000FF), ref: 006C8A5A
                                                                                                                                                                                                                                                      • GetStockObject.GDI32(00000011), ref: 006C8A76
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 006C8A81
                                                                                                                                                                                                                                                        • Part of subcall function 006C912D: GetCursorPos.USER32(?), ref: 006C9141
                                                                                                                                                                                                                                                        • Part of subcall function 006C912D: ScreenToClient.USER32(00000000,?), ref: 006C915E
                                                                                                                                                                                                                                                        • Part of subcall function 006C912D: GetAsyncKeyState.USER32(00000001), ref: 006C9183
                                                                                                                                                                                                                                                        • Part of subcall function 006C912D: GetAsyncKeyState.USER32(00000002), ref: 006C919D
                                                                                                                                                                                                                                                      • SetTimer.USER32(00000000,00000000,00000028,006C90FC), ref: 006C8AA8
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                                                                                                                                                                                      • String ID: AutoIt v3 GUI
                                                                                                                                                                                                                                                      • API String ID: 1458621304-248962490
                                                                                                                                                                                                                                                      • Opcode ID: 81f96450d318cdcbb14ad323facec8d314465277a1e6363042b39abeccb900dc
                                                                                                                                                                                                                                                      • Instruction ID: 9810ccaa2cc4bed2eaa22f95f6260cc200d95cfac56f61576aeaca4ce14bec00
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 81f96450d318cdcbb14ad323facec8d314465277a1e6363042b39abeccb900dc
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7BB1AF35640209DFDB14DF68CC55FAE7BB5FB48314F11822AFA05A72D0CB38A851CB58
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 007110F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00711114
                                                                                                                                                                                                                                                        • Part of subcall function 007110F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00710B9B,?,?,?), ref: 00711120
                                                                                                                                                                                                                                                        • Part of subcall function 007110F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00710B9B,?,?,?), ref: 0071112F
                                                                                                                                                                                                                                                        • Part of subcall function 007110F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00710B9B,?,?,?), ref: 00711136
                                                                                                                                                                                                                                                        • Part of subcall function 007110F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0071114D
                                                                                                                                                                                                                                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00710DF5
                                                                                                                                                                                                                                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00710E29
                                                                                                                                                                                                                                                      • GetLengthSid.ADVAPI32(?), ref: 00710E40
                                                                                                                                                                                                                                                      • GetAce.ADVAPI32(?,00000000,?), ref: 00710E7A
                                                                                                                                                                                                                                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00710E96
                                                                                                                                                                                                                                                      • GetLengthSid.ADVAPI32(?), ref: 00710EAD
                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00710EB5
                                                                                                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000), ref: 00710EBC
                                                                                                                                                                                                                                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00710EDD
                                                                                                                                                                                                                                                      • CopySid.ADVAPI32(00000000), ref: 00710EE4
                                                                                                                                                                                                                                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00710F13
                                                                                                                                                                                                                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00710F35
                                                                                                                                                                                                                                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00710F47
                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00710F6E
                                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00710F75
                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00710F7E
                                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00710F85
                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00710F8E
                                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00710F95
                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00710FA1
                                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00710FA8
                                                                                                                                                                                                                                                        • Part of subcall function 00711193: GetProcessHeap.KERNEL32(00000008,00710BB1,?,00000000,?,00710BB1,?), ref: 007111A1
                                                                                                                                                                                                                                                        • Part of subcall function 00711193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00710BB1,?), ref: 007111A8
                                                                                                                                                                                                                                                        • Part of subcall function 00711193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00710BB1,?), ref: 007111B7
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 4175595110-0
                                                                                                                                                                                                                                                      • Opcode ID: db2b04224bb45e9c2653ba82e28d21690379f593e1f58027877b62028eeb2eb5
                                                                                                                                                                                                                                                      • Instruction ID: 5d4457f7ceea0e105241b0566135e445e5a98c78bcd338ac929411a784e3ae7d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: db2b04224bb45e9c2653ba82e28d21690379f593e1f58027877b62028eeb2eb5
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9F718F7190120AEBDF219FA9DC49FEEBBBCBF05300F048115F919A6191D7799A85CBA0
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0073C4BD
                                                                                                                                                                                                                                                      • RegCreateKeyExW.ADVAPI32(?,?,00000000,0074CC08,00000000,?,00000000,?,?), ref: 0073C544
                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0073C5A4
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 0073C5F4
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 0073C66F
                                                                                                                                                                                                                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0073C6B2
                                                                                                                                                                                                                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0073C7C1
                                                                                                                                                                                                                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0073C84D
                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 0073C881
                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 0073C88E
                                                                                                                                                                                                                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0073C960
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                                                                                                                                                                                                      • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                                                                                                                                                                                      • API String ID: 9721498-966354055
                                                                                                                                                                                                                                                      • Opcode ID: a83c0c130d8638d0604ca65a34168fa77925509eab820046105ac722d439ec90
                                                                                                                                                                                                                                                      • Instruction ID: 5f58e9a8717e73bd41d8c3009461d61a5b0b69ad54da085a47019a1c5f92b20d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a83c0c130d8638d0604ca65a34168fa77925509eab820046105ac722d439ec90
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2D12AC756042009FD755DF14C881A6AB7E6FF88314F04889DF88AAB3A2DB35FD41CB85
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CharUpperBuffW.USER32(?,?), ref: 007409C6
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00740A01
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00740A54
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00740A8A
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00740B06
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00740B81
                                                                                                                                                                                                                                                        • Part of subcall function 006CF9F2: _wcslen.LIBCMT ref: 006CF9FD
                                                                                                                                                                                                                                                        • Part of subcall function 00712BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00712BFA
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                                                                                                                                                                                      • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                                                                                                                                                                                      • API String ID: 1103490817-4258414348
                                                                                                                                                                                                                                                      • Opcode ID: 15c154a84d77cbca4c15d43641bb6a4cc22743e18752e355338afd5a84846b59
                                                                                                                                                                                                                                                      • Instruction ID: ad4ed2b59e4e6678cc372c2ff8ee604b44027471f79d629534606cb1d480637a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 15c154a84d77cbca4c15d43641bb6a4cc22743e18752e355338afd5a84846b59
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 05E1BB712083018FCB54DF24C45096AB7E2FF88354B14895DF99A9B3A2DB38ED86CBD5
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                                                      • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                                                                                                                                                                                      • API String ID: 1256254125-909552448
                                                                                                                                                                                                                                                      • Opcode ID: 4aac105c500ee317cfbeef7aeee2fb73681666576e7e9e14a13e76034ca37f32
                                                                                                                                                                                                                                                      • Instruction ID: b2108e9a440f69e02ef9b47c96763ad15a6d810c9fe38e0f38d68fef81e4804d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4aac105c500ee317cfbeef7aeee2fb73681666576e7e9e14a13e76034ca37f32
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3F71077360012A8BEF12DF7CCD515BA3392AF60790F258529F855BB286EA3DCD45C3A0
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 0074835A
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 0074836E
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00748391
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 007483B4
                                                                                                                                                                                                                                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 007483F2
                                                                                                                                                                                                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,0074361A,?), ref: 0074844E
                                                                                                                                                                                                                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00748487
                                                                                                                                                                                                                                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 007484CA
                                                                                                                                                                                                                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00748501
                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(?), ref: 0074850D
                                                                                                                                                                                                                                                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0074851D
                                                                                                                                                                                                                                                      • DestroyIcon.USER32(?), ref: 0074852C
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00748549
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00748555
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                                                                                                                                                                                                      • String ID: .dll$.exe$.icl
                                                                                                                                                                                                                                                      • API String ID: 799131459-1154884017
                                                                                                                                                                                                                                                      • Opcode ID: 5085cedaa080fae1a01675227ef36b040f46b49e51fd4bd96fed6090e8dc6e4d
                                                                                                                                                                                                                                                      • Instruction ID: e16350ae5234a7553a3cfe0c29fa19f3b4bc666013715e4f963f87cf6df9b560
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5085cedaa080fae1a01675227ef36b040f46b49e51fd4bd96fed6090e8dc6e4d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D861F271900219BBEB54CF64CC81BBE77A8BF04720F10850AF915DA1D1DFB8AE90CBA0
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                                                                                                                                                                                                      • API String ID: 0-1645009161
                                                                                                                                                                                                                                                      • Opcode ID: daf06f4521b51f9c0bea0ed8f063d56ed585e5ad7a18559359fbae4286b196f0
                                                                                                                                                                                                                                                      • Instruction ID: b464907d9266e9b47e8e59486845c9186a4451e6dd75fe392c039111401706a0
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: daf06f4521b51f9c0bea0ed8f063d56ed585e5ad7a18559359fbae4286b196f0
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7781E7B1A04605BBDB20AF60CC46FFE37A7AF55300F044029FA05AB296EF74D951D7A5
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CharLowerBuffW.USER32(?,?), ref: 00723EF8
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00723F03
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00723F5A
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00723F98
                                                                                                                                                                                                                                                      • GetDriveTypeW.KERNEL32(?), ref: 00723FD6
                                                                                                                                                                                                                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0072401E
                                                                                                                                                                                                                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00724059
                                                                                                                                                                                                                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00724087
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                                                                                                                                                                                                                      • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                                                                                                                                                                                      • API String ID: 1839972693-4113822522
                                                                                                                                                                                                                                                      • Opcode ID: e69856cda345036c18c9b9f2f5c0a93b7ed897c9ed694d80db847cc8d5d1d813
                                                                                                                                                                                                                                                      • Instruction ID: 73e0ab6e69ed3e165cf9d8a68088546cd4efcf9dd74288b8504b49f11898c15d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e69856cda345036c18c9b9f2f5c0a93b7ed897c9ed694d80db847cc8d5d1d813
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 917102B26043219FC710EF24D8808ABB7F5EF94754F10892DF99597251EB38EE89CB91
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • LoadIconW.USER32(00000063), ref: 00715A2E
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00715A40
                                                                                                                                                                                                                                                      • SetWindowTextW.USER32(?,?), ref: 00715A57
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003EA), ref: 00715A6C
                                                                                                                                                                                                                                                      • SetWindowTextW.USER32(00000000,?), ref: 00715A72
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00715A82
                                                                                                                                                                                                                                                      • SetWindowTextW.USER32(00000000,?), ref: 00715A88
                                                                                                                                                                                                                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00715AA9
                                                                                                                                                                                                                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00715AC3
                                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00715ACC
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00715B33
                                                                                                                                                                                                                                                      • SetWindowTextW.USER32(?,?), ref: 00715B6F
                                                                                                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 00715B75
                                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000), ref: 00715B7C
                                                                                                                                                                                                                                                      • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00715BD3
                                                                                                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 00715BE0
                                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000005,00000000,?), ref: 00715C05
                                                                                                                                                                                                                                                      • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00715C2F
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 895679908-0
                                                                                                                                                                                                                                                      • Opcode ID: 100c10456f26416f26b1227ad3f14bf89847c81f1fd94311cef865c09fd7e018
                                                                                                                                                                                                                                                      • Instruction ID: b32ac43bcff129e1ce87f5d257a5490251fd4c0816fc65bf195a9fb7dc17a51d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 100c10456f26416f26b1227ad3f14bf89847c81f1fd94311cef865c09fd7e018
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 31719F71900B09EFDB25DFA8CE85AAEBBF5FF88704F108519E142A25E0D779E940CB54
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F89), ref: 0072FE27
                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F8A), ref: 0072FE32
                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 0072FE3D
                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F03), ref: 0072FE48
                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F8B), ref: 0072FE53
                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F01), ref: 0072FE5E
                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F81), ref: 0072FE69
                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F88), ref: 0072FE74
                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F80), ref: 0072FE7F
                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F86), ref: 0072FE8A
                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F83), ref: 0072FE95
                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F85), ref: 0072FEA0
                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F82), ref: 0072FEAB
                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F84), ref: 0072FEB6
                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F04), ref: 0072FEC1
                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 0072FECC
                                                                                                                                                                                                                                                      • GetCursorInfo.USER32(?), ref: 0072FEDC
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 0072FF1E
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Cursor$Load$ErrorInfoLast
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3215588206-0
                                                                                                                                                                                                                                                      • Opcode ID: 37f319e66719eac2c1c5649dee89e971cc41e741aff30e9fb8d868cff959ae64
                                                                                                                                                                                                                                                      • Instruction ID: 5d189dd9c46ecfbceedc6cc7840c546b769c5f17480faf959448022d978b37ee
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 37f319e66719eac2c1c5649dee89e971cc41e741aff30e9fb8d868cff959ae64
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 964140B0D053196ADB109FBA9C8986EBFF8FF04354B50853AF119E7281DB78A9018F91
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: _wcslen
                                                                                                                                                                                                                                                      • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[w
                                                                                                                                                                                                                                                      • API String ID: 176396367-778023905
                                                                                                                                                                                                                                                      • Opcode ID: 83172e9e9fb767e7cda6386b2cc8e67fc0095618325d7da5228cb798d475d87f
                                                                                                                                                                                                                                                      • Instruction ID: 2c0607b04ead8293926ae260145256ef93f6b099fc4e1dd3cd09ba607f7104c2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 83172e9e9fb767e7cda6386b2cc8e67fc0095618325d7da5228cb798d475d87f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 65E1E432A00516ABCF189FBCC451AFDBBB5BF44750F14812AE856B7280DB38AEC597D0
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 006D00C6
                                                                                                                                                                                                                                                        • Part of subcall function 006D00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0078070C,00000FA0,5DBB1618,?,?,?,?,006F23B3,000000FF), ref: 006D011C
                                                                                                                                                                                                                                                        • Part of subcall function 006D00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,006F23B3,000000FF), ref: 006D0127
                                                                                                                                                                                                                                                        • Part of subcall function 006D00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,006F23B3,000000FF), ref: 006D0138
                                                                                                                                                                                                                                                        • Part of subcall function 006D00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 006D014E
                                                                                                                                                                                                                                                        • Part of subcall function 006D00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 006D015C
                                                                                                                                                                                                                                                        • Part of subcall function 006D00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 006D016A
                                                                                                                                                                                                                                                        • Part of subcall function 006D00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 006D0195
                                                                                                                                                                                                                                                        • Part of subcall function 006D00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 006D01A0
                                                                                                                                                                                                                                                      • ___scrt_fastfail.LIBCMT ref: 006D00E7
                                                                                                                                                                                                                                                        • Part of subcall function 006D00A3: __onexit.LIBCMT ref: 006D00A9
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      • SleepConditionVariableCS, xrefs: 006D0154
                                                                                                                                                                                                                                                      • InitializeConditionVariable, xrefs: 006D0148
                                                                                                                                                                                                                                                      • WakeAllConditionVariable, xrefs: 006D0162
                                                                                                                                                                                                                                                      • kernel32.dll, xrefs: 006D0133
                                                                                                                                                                                                                                                      • api-ms-win-core-synch-l1-2-0.dll, xrefs: 006D0122
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                                                                                                                                                                                                      • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                                                                                                                                                                                      • API String ID: 66158676-1714406822
                                                                                                                                                                                                                                                      • Opcode ID: f7465cf3241ccde131f75ab0d3aa86fed56844ca296a8868db7ca6a52224e89d
                                                                                                                                                                                                                                                      • Instruction ID: 8705ce8aadf78f3cc340464df7befaa06bfbb2ccf95a82c90a9eee029bfea0c3
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f7465cf3241ccde131f75ab0d3aa86fed56844ca296a8868db7ca6a52224e89d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6121F6B2E457147BFB516BB4AC05F6A3396EB4AB51F10813FF801E2391DB7898008A98
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CharLowerBuffW.USER32(00000000,00000000,0074CC08), ref: 00724527
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 0072453B
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00724599
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 007245F4
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 0072463F
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 007246A7
                                                                                                                                                                                                                                                        • Part of subcall function 006CF9F2: _wcslen.LIBCMT ref: 006CF9FD
                                                                                                                                                                                                                                                      • GetDriveTypeW.KERNEL32(?,00776BF0,00000061), ref: 00724743
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: _wcslen$BuffCharDriveLowerType
                                                                                                                                                                                                                                                      • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                                                                                                                                                                                      • API String ID: 2055661098-1000479233
                                                                                                                                                                                                                                                      • Opcode ID: a2fb66de150f2c623e0062df3cc1674bacaace78daec70aabf28365f438bee20
                                                                                                                                                                                                                                                      • Instruction ID: 3d57e41ceb2ef36307e49675541163ae24a761fedbc5ba72a9167b31dcaaa204
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a2fb66de150f2c623e0062df3cc1674bacaace78daec70aabf28365f438bee20
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F8B1F2716083229FC710DF28E890A7AB7E6FFA5760F50491DF496C7291D738D984CBA2
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 006C9BB2
                                                                                                                                                                                                                                                      • DragQueryPoint.SHELL32(?,?), ref: 00749147
                                                                                                                                                                                                                                                        • Part of subcall function 00747674: ClientToScreen.USER32(?,?), ref: 0074769A
                                                                                                                                                                                                                                                        • Part of subcall function 00747674: GetWindowRect.USER32(?,?), ref: 00747710
                                                                                                                                                                                                                                                        • Part of subcall function 00747674: PtInRect.USER32(?,?,00748B89), ref: 00747720
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 007491B0
                                                                                                                                                                                                                                                      • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 007491BB
                                                                                                                                                                                                                                                      • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 007491DE
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00749225
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 0074923E
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 00749255
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 00749277
                                                                                                                                                                                                                                                      • DragFinish.SHELL32(?), ref: 0074927E
                                                                                                                                                                                                                                                      • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00749371
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                                                                                                                                                                                                      • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$p#x
                                                                                                                                                                                                                                                      • API String ID: 221274066-781702483
                                                                                                                                                                                                                                                      • Opcode ID: e53dddd28eb0e553673503a7fdce9512b12a40e7d101ccefe05c8337298b6865
                                                                                                                                                                                                                                                      • Instruction ID: c78a19b6c0e23f33e3c3b0bfecfd0d08ae85909d1ca7b7e9ab086e381d181cd1
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e53dddd28eb0e553673503a7fdce9512b12a40e7d101ccefe05c8337298b6865
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 01619C71108300AFC701EF64CC85DAFBBE9EF89350F00496EF695921A1DB749A49CB66
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,0074CC08), ref: 007340BB
                                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 007340CD
                                                                                                                                                                                                                                                      • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,0074CC08), ref: 007340F2
                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000,?,0074CC08), ref: 0073413E
                                                                                                                                                                                                                                                      • StringFromGUID2.OLE32(?,?,00000028,?,0074CC08), ref: 007341A8
                                                                                                                                                                                                                                                      • SysFreeString.OLEAUT32(00000009), ref: 00734262
                                                                                                                                                                                                                                                      • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 007342C8
                                                                                                                                                                                                                                                      • SysFreeString.OLEAUT32(?), ref: 007342F2
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                                                                                                                                                                                                                      • String ID: GetModuleHandleExW$kernel32.dll
                                                                                                                                                                                                                                                      • API String ID: 354098117-199464113
                                                                                                                                                                                                                                                      • Opcode ID: 92e728343e091f72cc784705de784e3cf65b9e91786f69b26e47e4462d5292f0
                                                                                                                                                                                                                                                      • Instruction ID: 1e23cf4417f92beb1b28acccf6e8fbd8aaa5cbcad6ae295a462e5eef037bd732
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 92e728343e091f72cc784705de784e3cf65b9e91786f69b26e47e4462d5292f0
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 86124E75A00119EFEB58CF94C884EAEBBB5FF45314F248099E905AB252D735FD42CBA0
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetMenuItemCount.USER32(00781990), ref: 006F2F8D
                                                                                                                                                                                                                                                      • GetMenuItemCount.USER32(00781990), ref: 006F303D
                                                                                                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 006F3081
                                                                                                                                                                                                                                                      • SetForegroundWindow.USER32(00000000), ref: 006F308A
                                                                                                                                                                                                                                                      • TrackPopupMenuEx.USER32(00781990,00000000,?,00000000,00000000,00000000), ref: 006F309D
                                                                                                                                                                                                                                                      • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 006F30A9
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                                                                                                                                                                                                                      • String ID: 0
                                                                                                                                                                                                                                                      • API String ID: 36266755-4108050209
                                                                                                                                                                                                                                                      • Opcode ID: b48e75b087ee20a424971b0293bdd666bdfdb1e6a2264cd366694552a9fee347
                                                                                                                                                                                                                                                      • Instruction ID: 15cc0e7ff651b66bbc5a9260e54c2a23b95ed325f58ed6b813c43ed622aa4b8c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b48e75b087ee20a424971b0293bdd666bdfdb1e6a2264cd366694552a9fee347
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 60710B7064121ABEEB218F64CC59FEABF66FF05324F204216F6146A3D0C7B5AD50DB90
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • DestroyWindow.USER32(00000000,?), ref: 00746DEB
                                                                                                                                                                                                                                                        • Part of subcall function 006B6B57: _wcslen.LIBCMT ref: 006B6B6A
                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00746E5F
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00746E81
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00746E94
                                                                                                                                                                                                                                                      • DestroyWindow.USER32(?), ref: 00746EB5
                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,006B0000,00000000), ref: 00746EE4
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00746EFD
                                                                                                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 00746F16
                                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000), ref: 00746F1D
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00746F35
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00746F4D
                                                                                                                                                                                                                                                        • Part of subcall function 006C9944: GetWindowLongW.USER32(?,000000EB), ref: 006C9952
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                                                                                                                                                                                                      • String ID: 0$tooltips_class32
                                                                                                                                                                                                                                                      • API String ID: 2429346358-3619404913
                                                                                                                                                                                                                                                      • Opcode ID: 86e856624650e5dce32d1e6c2155167c9836636bcb93f081814a7c3254f24ff2
                                                                                                                                                                                                                                                      • Instruction ID: 9a96874c6427639d76949a8bd1306c1fd8acef8abd875f9ddfb653ce56ead51f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 86e856624650e5dce32d1e6c2155167c9836636bcb93f081814a7c3254f24ff2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 39716974144340AFDB21CF18D844EAABBE9FB8A304F55845EF99987261C778E90ACB16
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0072C4B0
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0072C4C3
                                                                                                                                                                                                                                                      • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0072C4D7
                                                                                                                                                                                                                                                      • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0072C4F0
                                                                                                                                                                                                                                                      • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0072C533
                                                                                                                                                                                                                                                      • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0072C549
                                                                                                                                                                                                                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0072C554
                                                                                                                                                                                                                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0072C584
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0072C5DC
                                                                                                                                                                                                                                                      • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0072C5F0
                                                                                                                                                                                                                                                      • InternetCloseHandle.WININET(00000000), ref: 0072C5FB
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3800310941-3916222277
                                                                                                                                                                                                                                                      • Opcode ID: 21b2622b6565d46a065d0c1a85270457ec83dcb6324f8b8361809db2856da97a
                                                                                                                                                                                                                                                      • Instruction ID: 5118761cd6828361bc4ad130a04511f0114da661d889183bb21c3c9b15ddd374
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 21b2622b6565d46a065d0c1a85270457ec83dcb6324f8b8361809db2856da97a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5D517BB5500618BFEB239F61D988AAF7BFCFF19344F10841AF94596210DB78EA14DB60
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00748592
                                                                                                                                                                                                                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 007485A2
                                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000002,00000000), ref: 007485AD
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 007485BA
                                                                                                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 007485C8
                                                                                                                                                                                                                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 007485D7
                                                                                                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 007485E0
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 007485E7
                                                                                                                                                                                                                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 007485F8
                                                                                                                                                                                                                                                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,0074FC38,?), ref: 00748611
                                                                                                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00748621
                                                                                                                                                                                                                                                      • GetObjectW.GDI32(?,00000018,000000FF), ref: 00748641
                                                                                                                                                                                                                                                      • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00748671
                                                                                                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 00748699
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 007486AF
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3840717409-0
                                                                                                                                                                                                                                                      • Opcode ID: 98e6e5482e415bf1af9c9109c95e0bc93c725d288211e8357c39a0a0c2a099a0
                                                                                                                                                                                                                                                      • Instruction ID: 653f4859cfd7e247e7f269e12c6c2a7f7088cd39fe1b8b4e2ca1f641e461f991
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 98e6e5482e415bf1af9c9109c95e0bc93c725d288211e8357c39a0a0c2a099a0
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 06413C75601208AFDB519FA5CC48EAE7BB8FF8A711F118059F905E7260DB789D01CB25
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • VariantInit.OLEAUT32(00000000), ref: 00721502
                                                                                                                                                                                                                                                      • VariantCopy.OLEAUT32(?,?), ref: 0072150B
                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00721517
                                                                                                                                                                                                                                                      • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 007215FB
                                                                                                                                                                                                                                                      • VarR8FromDec.OLEAUT32(?,?), ref: 00721657
                                                                                                                                                                                                                                                      • VariantInit.OLEAUT32(?), ref: 00721708
                                                                                                                                                                                                                                                      • SysFreeString.OLEAUT32(?), ref: 0072178C
                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 007217D8
                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 007217E7
                                                                                                                                                                                                                                                      • VariantInit.OLEAUT32(00000000), ref: 00721823
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                                                                                                                                                                                                                      • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                                                                                                                                                                                                      • API String ID: 1234038744-3931177956
                                                                                                                                                                                                                                                      • Opcode ID: e799b0409cf8c20d852542525fb3ea37a30a14794c8dc47dae6e462173756232
                                                                                                                                                                                                                                                      • Instruction ID: 9de59d811457d118545713129b4b6ff0b0cc425ca6eefaf6a9899c6fb21ef34e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e799b0409cf8c20d852542525fb3ea37a30a14794c8dc47dae6e462173756232
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 67D12471A00225DBDB009F66E885BBDB7B6FF55700F90809AF406AB280DB38ED51DB61
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006B9CB3: _wcslen.LIBCMT ref: 006B9CBD
                                                                                                                                                                                                                                                        • Part of subcall function 0073C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0073B6AE,?,?), ref: 0073C9B5
                                                                                                                                                                                                                                                        • Part of subcall function 0073C998: _wcslen.LIBCMT ref: 0073C9F1
                                                                                                                                                                                                                                                        • Part of subcall function 0073C998: _wcslen.LIBCMT ref: 0073CA68
                                                                                                                                                                                                                                                        • Part of subcall function 0073C998: _wcslen.LIBCMT ref: 0073CA9E
                                                                                                                                                                                                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0073B6F4
                                                                                                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0073B772
                                                                                                                                                                                                                                                      • RegDeleteValueW.ADVAPI32(?,?), ref: 0073B80A
                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 0073B87E
                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 0073B89C
                                                                                                                                                                                                                                                      • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0073B8F2
                                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0073B904
                                                                                                                                                                                                                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 0073B922
                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000), ref: 0073B983
                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 0073B994
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                                                                                                                                                                                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                                                                                                                                                      • API String ID: 146587525-4033151799
                                                                                                                                                                                                                                                      • Opcode ID: dc189d85639479062f122a8228c85850626daf0971b7e789f912ddfe75d0518f
                                                                                                                                                                                                                                                      • Instruction ID: 6370c8c59afad4624d85723d3d38510478560a000a657b96bd868209ccdd83bc
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: dc189d85639479062f122a8228c85850626daf0971b7e789f912ddfe75d0518f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 16C17A74204201EFE714DF14C495F6ABBE5EF84318F14849DF69A8B2A3CB39E985CB91
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetDC.USER32(00000000), ref: 007325D8
                                                                                                                                                                                                                                                      • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 007325E8
                                                                                                                                                                                                                                                      • CreateCompatibleDC.GDI32(?), ref: 007325F4
                                                                                                                                                                                                                                                      • SelectObject.GDI32(00000000,?), ref: 00732601
                                                                                                                                                                                                                                                      • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 0073266D
                                                                                                                                                                                                                                                      • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 007326AC
                                                                                                                                                                                                                                                      • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 007326D0
                                                                                                                                                                                                                                                      • SelectObject.GDI32(?,?), ref: 007326D8
                                                                                                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 007326E1
                                                                                                                                                                                                                                                      • DeleteDC.GDI32(?), ref: 007326E8
                                                                                                                                                                                                                                                      • ReleaseDC.USER32(00000000,?), ref: 007326F3
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                                                                                                                                                                                      • String ID: (
                                                                                                                                                                                                                                                      • API String ID: 2598888154-3887548279
                                                                                                                                                                                                                                                      • Opcode ID: b645e76f93086f9d7b232bde352b75890c2351fa1a13aa2cce53b24029580b3b
                                                                                                                                                                                                                                                      • Instruction ID: 66c0c9c827b1f970adab1557b8b96576fde86501832ced0fc490aee666a19e54
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b645e76f93086f9d7b232bde352b75890c2351fa1a13aa2cce53b24029580b3b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6C6112B5D00219EFDF05CFA4D884EAEBBB6FF48310F20842AE955A7251D774A941CF54
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • ___free_lconv_mon.LIBCMT ref: 006EDAA1
                                                                                                                                                                                                                                                        • Part of subcall function 006ED63C: _free.LIBCMT ref: 006ED659
                                                                                                                                                                                                                                                        • Part of subcall function 006ED63C: _free.LIBCMT ref: 006ED66B
                                                                                                                                                                                                                                                        • Part of subcall function 006ED63C: _free.LIBCMT ref: 006ED67D
                                                                                                                                                                                                                                                        • Part of subcall function 006ED63C: _free.LIBCMT ref: 006ED68F
                                                                                                                                                                                                                                                        • Part of subcall function 006ED63C: _free.LIBCMT ref: 006ED6A1
                                                                                                                                                                                                                                                        • Part of subcall function 006ED63C: _free.LIBCMT ref: 006ED6B3
                                                                                                                                                                                                                                                        • Part of subcall function 006ED63C: _free.LIBCMT ref: 006ED6C5
                                                                                                                                                                                                                                                        • Part of subcall function 006ED63C: _free.LIBCMT ref: 006ED6D7
                                                                                                                                                                                                                                                        • Part of subcall function 006ED63C: _free.LIBCMT ref: 006ED6E9
                                                                                                                                                                                                                                                        • Part of subcall function 006ED63C: _free.LIBCMT ref: 006ED6FB
                                                                                                                                                                                                                                                        • Part of subcall function 006ED63C: _free.LIBCMT ref: 006ED70D
                                                                                                                                                                                                                                                        • Part of subcall function 006ED63C: _free.LIBCMT ref: 006ED71F
                                                                                                                                                                                                                                                        • Part of subcall function 006ED63C: _free.LIBCMT ref: 006ED731
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006EDA96
                                                                                                                                                                                                                                                        • Part of subcall function 006E29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,006ED7D1,00000000,00000000,00000000,00000000,?,006ED7F8,00000000,00000007,00000000,?,006EDBF5,00000000), ref: 006E29DE
                                                                                                                                                                                                                                                        • Part of subcall function 006E29C8: GetLastError.KERNEL32(00000000,?,006ED7D1,00000000,00000000,00000000,00000000,?,006ED7F8,00000000,00000007,00000000,?,006EDBF5,00000000,00000000), ref: 006E29F0
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006EDAB8
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006EDACD
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006EDAD8
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006EDAFA
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006EDB0D
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006EDB1B
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006EDB26
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006EDB5E
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006EDB65
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006EDB82
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006EDB9A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 161543041-0
                                                                                                                                                                                                                                                      • Opcode ID: 6f30d1c02270d33bec1f5a7739fcfd5764dc05d3bfcf2ef7278b4a2581787d08
                                                                                                                                                                                                                                                      • Instruction ID: d2219c7569e208f7eec80ad33a5d36fde5a19fd7a03c8d9dab7165f8cf1e5be8
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6f30d1c02270d33bec1f5a7739fcfd5764dc05d3bfcf2ef7278b4a2581787d08
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 263180715063899FDB61AA3BD846B9A77EBFF00710F11442DE458DB292DF35AD408B24
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetClassNameW.USER32(?,?,00000100), ref: 0071369C
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 007136A7
                                                                                                                                                                                                                                                      • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00713797
                                                                                                                                                                                                                                                      • GetClassNameW.USER32(?,?,00000400), ref: 0071380C
                                                                                                                                                                                                                                                      • GetDlgCtrlID.USER32(?), ref: 0071385D
                                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00713882
                                                                                                                                                                                                                                                      • GetParent.USER32(?), ref: 007138A0
                                                                                                                                                                                                                                                      • ScreenToClient.USER32(00000000), ref: 007138A7
                                                                                                                                                                                                                                                      • GetClassNameW.USER32(?,?,00000100), ref: 00713921
                                                                                                                                                                                                                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 0071395D
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                                                                                                                                                                                                                      • String ID: %s%u
                                                                                                                                                                                                                                                      • API String ID: 4010501982-679674701
                                                                                                                                                                                                                                                      • Opcode ID: ceb798f55502e8795a5d4022b25ccaeb52d7cb1c01774d878774e44f1c3b3661
                                                                                                                                                                                                                                                      • Instruction ID: 9d6744347efc6241b86adc23b4b2625c3cc5235bfc32ee2e46b9b9c58f3192fb
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ceb798f55502e8795a5d4022b25ccaeb52d7cb1c01774d878774e44f1c3b3661
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6191D571204606AFD715DF28C885FEAF7A9FF44354F008629F999D21D0DB38EA85CBA1
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetClassNameW.USER32(?,?,00000400), ref: 00714994
                                                                                                                                                                                                                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 007149DA
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 007149EB
                                                                                                                                                                                                                                                      • CharUpperBuffW.USER32(?,00000000), ref: 007149F7
                                                                                                                                                                                                                                                      • _wcsstr.LIBVCRUNTIME ref: 00714A2C
                                                                                                                                                                                                                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 00714A64
                                                                                                                                                                                                                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 00714A9D
                                                                                                                                                                                                                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 00714AE6
                                                                                                                                                                                                                                                      • GetClassNameW.USER32(?,?,00000400), ref: 00714B20
                                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00714B8B
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                                                                                                                                                                                                      • String ID: ThumbnailClass
                                                                                                                                                                                                                                                      • API String ID: 1311036022-1241985126
                                                                                                                                                                                                                                                      • Opcode ID: 8b916b9fbea4634a6301d4886533bb1156e073790b0542fb5509d71c473fdb22
                                                                                                                                                                                                                                                      • Instruction ID: 00c3853e829081632ee30d09f6ed64e28b9758203938d539dfef892eed8bdf30
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8b916b9fbea4634a6301d4886533bb1156e073790b0542fb5509d71c473fdb22
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A991BDB10082059FDB14CF18C985BEA77E9FF84354F04846AFD899A1D6DB38ED85CBA1
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(00781990,000000FF,00000000,00000030), ref: 0071BFAC
                                                                                                                                                                                                                                                      • SetMenuItemInfoW.USER32(00781990,00000004,00000000,00000030), ref: 0071BFE1
                                                                                                                                                                                                                                                      • Sleep.KERNEL32(000001F4), ref: 0071BFF3
                                                                                                                                                                                                                                                      • GetMenuItemCount.USER32(?), ref: 0071C039
                                                                                                                                                                                                                                                      • GetMenuItemID.USER32(?,00000000), ref: 0071C056
                                                                                                                                                                                                                                                      • GetMenuItemID.USER32(?,-00000001), ref: 0071C082
                                                                                                                                                                                                                                                      • GetMenuItemID.USER32(?,?), ref: 0071C0C9
                                                                                                                                                                                                                                                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0071C10F
                                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0071C124
                                                                                                                                                                                                                                                      • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0071C145
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ItemMenu$Info$CheckCountRadioSleep
                                                                                                                                                                                                                                                      • String ID: 0
                                                                                                                                                                                                                                                      • API String ID: 1460738036-4108050209
                                                                                                                                                                                                                                                      • Opcode ID: 30ad2230d19a2d23dfb9ef1162629dbc8ebb901b61a6817e753ff73c77b4d43c
                                                                                                                                                                                                                                                      • Instruction ID: 2d65a230216a490000122ee1a003ab950d25a2bdcebddcd5c85ec86b8fc8a9a6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 30ad2230d19a2d23dfb9ef1162629dbc8ebb901b61a6817e753ff73c77b4d43c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0E6171B0980249EFDF12CFACCD88AEEBB79EB05344F104155E911A32D1D739AD95DB60
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0073CC64
                                                                                                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 0073CC8D
                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0073CD48
                                                                                                                                                                                                                                                        • Part of subcall function 0073CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 0073CCAA
                                                                                                                                                                                                                                                        • Part of subcall function 0073CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 0073CCBD
                                                                                                                                                                                                                                                        • Part of subcall function 0073CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0073CCCF
                                                                                                                                                                                                                                                        • Part of subcall function 0073CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0073CD05
                                                                                                                                                                                                                                                        • Part of subcall function 0073CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0073CD28
                                                                                                                                                                                                                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 0073CCF3
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                                                                                                                                                                                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                                                                                                                                                      • API String ID: 2734957052-4033151799
                                                                                                                                                                                                                                                      • Opcode ID: da68f03e76a6687b4f28c144728634a4ce3db1185a46fd45c7e732d4039fde82
                                                                                                                                                                                                                                                      • Instruction ID: 7989e8a6416af7796235fa4f9831b1af70f4099ed57e4e5bc4b2e6d5e5306e56
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: da68f03e76a6687b4f28c144728634a4ce3db1185a46fd45c7e732d4039fde82
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 503180B5A02128BBEB228B50DC88EFFBB7CEF06740F004165B905E6151DB389A45DBB0
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00723D40
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00723D6D
                                                                                                                                                                                                                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00723D9D
                                                                                                                                                                                                                                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00723DBE
                                                                                                                                                                                                                                                      • RemoveDirectoryW.KERNEL32(?), ref: 00723DCE
                                                                                                                                                                                                                                                      • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00723E55
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00723E60
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00723E6B
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                                                                                                                                                                                                                      • String ID: :$\$\??\%s
                                                                                                                                                                                                                                                      • API String ID: 1149970189-3457252023
                                                                                                                                                                                                                                                      • Opcode ID: 8228518875a3ceb66981836cf6abd99fbf0d146043d179cfc14f2bca2e371ca3
                                                                                                                                                                                                                                                      • Instruction ID: ec7457e62f88df81de3ea298ed7198ab4fa65530ac80ed3b07c7b05b50f3d915
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8228518875a3ceb66981836cf6abd99fbf0d146043d179cfc14f2bca2e371ca3
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5531A776A00119ABDB219FA0DC49FEF37BDEF89740F1041BAF509D6150E77897448B68
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • timeGetTime.WINMM ref: 0071E6B4
                                                                                                                                                                                                                                                        • Part of subcall function 006CE551: timeGetTime.WINMM(?,?,0071E6D4), ref: 006CE555
                                                                                                                                                                                                                                                      • Sleep.KERNEL32(0000000A), ref: 0071E6E1
                                                                                                                                                                                                                                                      • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 0071E705
                                                                                                                                                                                                                                                      • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0071E727
                                                                                                                                                                                                                                                      • SetActiveWindow.USER32 ref: 0071E746
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0071E754
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 0071E773
                                                                                                                                                                                                                                                      • Sleep.KERNEL32(000000FA), ref: 0071E77E
                                                                                                                                                                                                                                                      • IsWindow.USER32 ref: 0071E78A
                                                                                                                                                                                                                                                      • EndDialog.USER32(00000000), ref: 0071E79B
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                                                                                                                                                                                      • String ID: BUTTON
                                                                                                                                                                                                                                                      • API String ID: 1194449130-3405671355
                                                                                                                                                                                                                                                      • Opcode ID: 86f04657c12da3857eb22ce220e0b6afe68a0f60802e806f5c879347756fa890
                                                                                                                                                                                                                                                      • Instruction ID: 1541084a7d7a70ac03c6f747d6fdadc095ba0872e909aea5e65c840630c9bbcc
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 86f04657c12da3857eb22ce220e0b6afe68a0f60802e806f5c879347756fa890
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8E21F6B4341204AFFB015F24EC89E653BA9F756749F64C425FC01815E2EB7D9C418B1C
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006B9CB3: _wcslen.LIBCMT ref: 006B9CBD
                                                                                                                                                                                                                                                      • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0071EA5D
                                                                                                                                                                                                                                                      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0071EA73
                                                                                                                                                                                                                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0071EA84
                                                                                                                                                                                                                                                      • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0071EA96
                                                                                                                                                                                                                                                      • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0071EAA7
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: SendString$_wcslen
                                                                                                                                                                                                                                                      • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                                                                                                                                                                                      • API String ID: 2420728520-1007645807
                                                                                                                                                                                                                                                      • Opcode ID: 84fce69420f7d1faa37cdcde91ae9cb11572e87cf18e70313fa39182b9be0351
                                                                                                                                                                                                                                                      • Instruction ID: 994a503025440023c7fbc7ef6066310a47efc39b4e479efc28ec7f2de39a50c5
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 84fce69420f7d1faa37cdcde91ae9cb11572e87cf18e70313fa39182b9be0351
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B811E3B0A4026979DB20A3A5DC4ADFF6F7CEFD1F40F00442DB901A20D5EE741984CAB0
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,00000001), ref: 00715CE2
                                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000,?), ref: 00715CFB
                                                                                                                                                                                                                                                      • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00715D59
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,00000002), ref: 00715D69
                                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000,?), ref: 00715D7B
                                                                                                                                                                                                                                                      • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00715DCF
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00715DDD
                                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000,?), ref: 00715DEF
                                                                                                                                                                                                                                                      • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00715E31
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003EA), ref: 00715E44
                                                                                                                                                                                                                                                      • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00715E5A
                                                                                                                                                                                                                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00715E67
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$ItemMoveRect$Invalidate
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3096461208-0
                                                                                                                                                                                                                                                      • Opcode ID: 29fa91cf1d96652f9ea42d4dfa9dacdd4de03f3de1d2dc6342bb3fb3cfb25bc1
                                                                                                                                                                                                                                                      • Instruction ID: 5e27d780ffc7acf3dad2f047d1284ffd0a23701707601d0f3b3658c1d0296f7d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 29fa91cf1d96652f9ea42d4dfa9dacdd4de03f3de1d2dc6342bb3fb3cfb25bc1
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8F513E74B00605AFDF19CF68DD89AAEBBB5FB88300F148229F915E7290D7749E44CB51
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006C8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,006C8BE8,?,00000000,?,?,?,?,006C8BBA,00000000,?), ref: 006C8FC5
                                                                                                                                                                                                                                                      • DestroyWindow.USER32(?), ref: 006C8C81
                                                                                                                                                                                                                                                      • KillTimer.USER32(00000000,?,?,?,?,006C8BBA,00000000,?), ref: 006C8D1B
                                                                                                                                                                                                                                                      • DestroyAcceleratorTable.USER32(00000000), ref: 00706973
                                                                                                                                                                                                                                                      • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,006C8BBA,00000000,?), ref: 007069A1
                                                                                                                                                                                                                                                      • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,006C8BBA,00000000,?), ref: 007069B8
                                                                                                                                                                                                                                                      • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,006C8BBA,00000000), ref: 007069D4
                                                                                                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 007069E6
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 641708696-0
                                                                                                                                                                                                                                                      • Opcode ID: f90f41a4335dafb8c755deb0c8c97b836ac4a422f1a688a1c72315cb7dff2cd6
                                                                                                                                                                                                                                                      • Instruction ID: 6cc0afc55d76e29eead762df713b935eae8d3f6b53c4e7676096b2c7d2ae4f29
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f90f41a4335dafb8c755deb0c8c97b836ac4a422f1a688a1c72315cb7dff2cd6
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4A617931102600DFCB369F14D958B7577F2FB41312F65861DE0429BAA0CB39B992DF98
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006C9944: GetWindowLongW.USER32(?,000000EB), ref: 006C9952
                                                                                                                                                                                                                                                      • GetSysColor.USER32(0000000F), ref: 006C9862
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ColorLongWindow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 259745315-0
                                                                                                                                                                                                                                                      • Opcode ID: 4a2cbac5824d0b170daf1c5c0af8018c94ebdda0a412ba352d9e6bb99076fc44
                                                                                                                                                                                                                                                      • Instruction ID: 1ac3911802627c89970e9e0ff3dda547d9a078e6412f544305a5c6a7addce44c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4a2cbac5824d0b170daf1c5c0af8018c94ebdda0a412ba352d9e6bb99076fc44
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0941B5355066449FDB215F389C48FB937A6EB07330F148B0AF9A28B2E1D7359D42DB24
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: .m
                                                                                                                                                                                                                                                      • API String ID: 0-2594521899
                                                                                                                                                                                                                                                      • Opcode ID: a9f1fff96b8085e7ecee56876c9f7a763b1d76df5313b674f1c467d4e4d36fee
                                                                                                                                                                                                                                                      • Instruction ID: 3fcc06089bea46b7603606af532b1f03c4280c155506fd6141ca272bce5eaba0
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a9f1fff96b8085e7ecee56876c9f7a763b1d76df5313b674f1c467d4e4d36fee
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6EC11274D06389AFCB51DFAAC841BEDBBB2AF09310F54419DE519AB392C7348941CB74
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,006FF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00719717
                                                                                                                                                                                                                                                      • LoadStringW.USER32(00000000,?,006FF7F8,00000001), ref: 00719720
                                                                                                                                                                                                                                                        • Part of subcall function 006B9CB3: _wcslen.LIBCMT ref: 006B9CBD
                                                                                                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,006FF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00719742
                                                                                                                                                                                                                                                      • LoadStringW.USER32(00000000,?,006FF7F8,00000001), ref: 00719745
                                                                                                                                                                                                                                                      • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00719866
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: HandleLoadModuleString$Message_wcslen
                                                                                                                                                                                                                                                      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                                                                                                                                                                                      • API String ID: 747408836-2268648507
                                                                                                                                                                                                                                                      • Opcode ID: b78c9ea7cdf65586ae3e48fa699138487a089c53de96e38801d25fe9a56b74bd
                                                                                                                                                                                                                                                      • Instruction ID: 923a4441e851f8dac0de0202906dbea9d89cffcddc6b10142d3a41d9a535f7d4
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b78c9ea7cdf65586ae3e48fa699138487a089c53de96e38801d25fe9a56b74bd
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 394171B2900219AACF44FBE4CD96DEE7779AF15340F604029F20572092EB396F89CB75
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006B6B57: _wcslen.LIBCMT ref: 006B6B6A
                                                                                                                                                                                                                                                      • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 007107A2
                                                                                                                                                                                                                                                      • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 007107BE
                                                                                                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 007107DA
                                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00710804
                                                                                                                                                                                                                                                      • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 0071082C
                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00710837
                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0071083C
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                                                                                                                                                                                                      • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                                                                                                                                                                                      • API String ID: 323675364-22481851
                                                                                                                                                                                                                                                      • Opcode ID: 17e8a30636db6a88b842f50e5cefaab6ad669d4d6320f11f8c4b42eda72d1aa1
                                                                                                                                                                                                                                                      • Instruction ID: 5bea4741d9bbae5a098b812993c205530ff78c620287995081059ad02576e1a3
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 17e8a30636db6a88b842f50e5cefaab6ad669d4d6320f11f8c4b42eda72d1aa1
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 07413BB5C10229ABDF15EB94DC95CEDB779BF04350B14412AE901A71A0EB74AE84CBA4
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • VariantInit.OLEAUT32(?), ref: 00733C5C
                                                                                                                                                                                                                                                      • CoInitialize.OLE32(00000000), ref: 00733C8A
                                                                                                                                                                                                                                                      • CoUninitialize.OLE32 ref: 00733C94
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00733D2D
                                                                                                                                                                                                                                                      • GetRunningObjectTable.OLE32(00000000,?), ref: 00733DB1
                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000001,00000029), ref: 00733ED5
                                                                                                                                                                                                                                                      • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00733F0E
                                                                                                                                                                                                                                                      • CoGetObject.OLE32(?,00000000,0074FB98,?), ref: 00733F2D
                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000000), ref: 00733F40
                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00733FC4
                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00733FD8
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 429561992-0
                                                                                                                                                                                                                                                      • Opcode ID: 3c8091180d4603c25ce096bb0d59d6f9cecf992282e9b9e6178f8aada39325fe
                                                                                                                                                                                                                                                      • Instruction ID: 45134cc16d51c20449a0fec94635ad478790fb8f25424bff879e45c5acfdcaa2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3c8091180d4603c25ce096bb0d59d6f9cecf992282e9b9e6178f8aada39325fe
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F8C168B16083059FE710DF68C88492BBBE9FF89744F00491DF98A9B252D735EE45CB62
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CoInitialize.OLE32(00000000), ref: 00727AF3
                                                                                                                                                                                                                                                      • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00727B8F
                                                                                                                                                                                                                                                      • SHGetDesktopFolder.SHELL32(?), ref: 00727BA3
                                                                                                                                                                                                                                                      • CoCreateInstance.OLE32(0074FD08,00000000,00000001,00776E6C,?), ref: 00727BEF
                                                                                                                                                                                                                                                      • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00727C74
                                                                                                                                                                                                                                                      • CoTaskMemFree.OLE32(?,?), ref: 00727CCC
                                                                                                                                                                                                                                                      • SHBrowseForFolderW.SHELL32(?), ref: 00727D57
                                                                                                                                                                                                                                                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00727D7A
                                                                                                                                                                                                                                                      • CoTaskMemFree.OLE32(00000000), ref: 00727D81
                                                                                                                                                                                                                                                      • CoTaskMemFree.OLE32(00000000), ref: 00727DD6
                                                                                                                                                                                                                                                      • CoUninitialize.OLE32 ref: 00727DDC
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2762341140-0
                                                                                                                                                                                                                                                      • Opcode ID: 422678cb4e994c9a0c4ec8d665a50bbda320b7cbc2d1b60da22bfa5f1eeb7d3f
                                                                                                                                                                                                                                                      • Instruction ID: e0f7ec971918895b16cba591529fef41eae5ba0c2820de06e22170e0aeae02e4
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 422678cb4e994c9a0c4ec8d665a50bbda320b7cbc2d1b60da22bfa5f1eeb7d3f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5CC15B75A00119AFCB14DFA4D984DAEBBF9FF48304B148499E81ADB361D734EE81CB94
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00745504
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00745515
                                                                                                                                                                                                                                                      • CharNextW.USER32(00000158), ref: 00745544
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00745585
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0074559B
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 007455AC
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$CharNext
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1350042424-0
                                                                                                                                                                                                                                                      • Opcode ID: bab783717c36295d3c2d768c0cafae826b00205c0c09fc0a8f8ecd87248c3c8d
                                                                                                                                                                                                                                                      • Instruction ID: acc04f8fb2fc2ce79ff99a8daf40cd764f61bbaa3be92bd70aeca3e7fa1d50b1
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bab783717c36295d3c2d768c0cafae826b00205c0c09fc0a8f8ecd87248c3c8d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C561C034905608EFDF119F64CC84DFE7BB9EF06720F108145F925AB292D7789A80DB61
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 0070FAAF
                                                                                                                                                                                                                                                      • SafeArrayAllocData.OLEAUT32(?), ref: 0070FB08
                                                                                                                                                                                                                                                      • VariantInit.OLEAUT32(?), ref: 0070FB1A
                                                                                                                                                                                                                                                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 0070FB3A
                                                                                                                                                                                                                                                      • VariantCopy.OLEAUT32(?,?), ref: 0070FB8D
                                                                                                                                                                                                                                                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 0070FBA1
                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 0070FBB6
                                                                                                                                                                                                                                                      • SafeArrayDestroyData.OLEAUT32(?), ref: 0070FBC3
                                                                                                                                                                                                                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0070FBCC
                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 0070FBDE
                                                                                                                                                                                                                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0070FBE9
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2706829360-0
                                                                                                                                                                                                                                                      • Opcode ID: d0d9c1e9a92e7bd9d796c77e17764ef60b176eea2af68e6e6673081ba93b2d73
                                                                                                                                                                                                                                                      • Instruction ID: bc507df3eceb9e78002deba2987398ff71f83ee90591bb4ef14eb68c13fb57f0
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d0d9c1e9a92e7bd9d796c77e17764ef60b176eea2af68e6e6673081ba93b2d73
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6F417F75A00219DFCB11DFA8C8589AEBFB9FF48354F00C169E905A7261CB38A945CFA4
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetKeyboardState.USER32(?), ref: 00719CA1
                                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(000000A0), ref: 00719D22
                                                                                                                                                                                                                                                      • GetKeyState.USER32(000000A0), ref: 00719D3D
                                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(000000A1), ref: 00719D57
                                                                                                                                                                                                                                                      • GetKeyState.USER32(000000A1), ref: 00719D6C
                                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(00000011), ref: 00719D84
                                                                                                                                                                                                                                                      • GetKeyState.USER32(00000011), ref: 00719D96
                                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(00000012), ref: 00719DAE
                                                                                                                                                                                                                                                      • GetKeyState.USER32(00000012), ref: 00719DC0
                                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(0000005B), ref: 00719DD8
                                                                                                                                                                                                                                                      • GetKeyState.USER32(0000005B), ref: 00719DEA
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: State$Async$Keyboard
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 541375521-0
                                                                                                                                                                                                                                                      • Opcode ID: eab592e8812992a6148be510514ea718ed365bcfff639a1133ba7fa2b031bb6c
                                                                                                                                                                                                                                                      • Instruction ID: f63a3e8c13f8ce09b1a657489fecd113e5834ce8dc39b2137cd38a3347c59629
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: eab592e8812992a6148be510514ea718ed365bcfff639a1133ba7fa2b031bb6c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: EE41D8346047C969FF718A78D4243F5FEF06B12344F08805ADBC6565C2E7AC99C9C7A2
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • WSAStartup.WSOCK32(00000101,?), ref: 007305BC
                                                                                                                                                                                                                                                      • inet_addr.WSOCK32(?), ref: 0073061C
                                                                                                                                                                                                                                                      • gethostbyname.WSOCK32(?), ref: 00730628
                                                                                                                                                                                                                                                      • IcmpCreateFile.IPHLPAPI ref: 00730636
                                                                                                                                                                                                                                                      • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 007306C6
                                                                                                                                                                                                                                                      • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 007306E5
                                                                                                                                                                                                                                                      • IcmpCloseHandle.IPHLPAPI(?), ref: 007307B9
                                                                                                                                                                                                                                                      • WSACleanup.WSOCK32 ref: 007307BF
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                                                                                                                                                                                      • String ID: Ping
                                                                                                                                                                                                                                                      • API String ID: 1028309954-2246546115
                                                                                                                                                                                                                                                      • Opcode ID: f0a5f0fb1758b8efb16a1f4ac6e5b3ff35294e7c3f8899a1e1b01def46a6e683
                                                                                                                                                                                                                                                      • Instruction ID: 8f12bd5b8a32a83652e6ff1da7eb160c425cc8c7386c05d81796935e0ef65800
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f0a5f0fb1758b8efb16a1f4ac6e5b3ff35294e7c3f8899a1e1b01def46a6e683
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1A919D756042019FE720DF15C499F1ABBE5AF84318F1485A9F46A8B6A2C738ED81CFD1
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: _wcslen$BuffCharLower
                                                                                                                                                                                                                                                      • String ID: cdecl$none$stdcall$winapi
                                                                                                                                                                                                                                                      • API String ID: 707087890-567219261
                                                                                                                                                                                                                                                      • Opcode ID: d46b22bd2ff98cb1529f996e12a2501e850eeb503437473a60a74ecc695a1f86
                                                                                                                                                                                                                                                      • Instruction ID: 72d88686c1ced6486c0be3d95662e21e09a7eba15b2e2d8ff5696f3500e07097
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d46b22bd2ff98cb1529f996e12a2501e850eeb503437473a60a74ecc695a1f86
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 06519072A002169BDF54DF68C9509BEB7A6BF68720B204229F426E7286DB38DD40C7D1
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CoInitialize.OLE32 ref: 00733774
                                                                                                                                                                                                                                                      • CoUninitialize.OLE32 ref: 0073377F
                                                                                                                                                                                                                                                      • CoCreateInstance.OLE32(?,00000000,00000017,0074FB78,?), ref: 007337D9
                                                                                                                                                                                                                                                      • IIDFromString.OLE32(?,?), ref: 0073384C
                                                                                                                                                                                                                                                      • VariantInit.OLEAUT32(?), ref: 007338E4
                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00733936
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                                                                                                                                                                                                      • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                                                                                                                                                                                      • API String ID: 636576611-1287834457
                                                                                                                                                                                                                                                      • Opcode ID: 9f36dcaa582590a0c6aa79b65090fb7d35ee263535b30128d260be3608c3016a
                                                                                                                                                                                                                                                      • Instruction ID: 257ada47150d6d74a904694f3e79c8e383a44cdb049f025daf25bc65f02dbe62
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9f36dcaa582590a0c6aa79b65090fb7d35ee263535b30128d260be3608c3016a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1961B2B1608301AFE321DF54C889F9AB7E8EF45715F00491DF5859B292C778EE84CBA6
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 007233CF
                                                                                                                                                                                                                                                        • Part of subcall function 006B9CB3: _wcslen.LIBCMT ref: 006B9CBD
                                                                                                                                                                                                                                                      • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 007233F0
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: LoadString$_wcslen
                                                                                                                                                                                                                                                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                                                                                                                                                                                                      • API String ID: 4099089115-3080491070
                                                                                                                                                                                                                                                      • Opcode ID: e95ae93ed3c9accbb9b96efc98d80d94282711a25184a2725b8e0bf8299b06d1
                                                                                                                                                                                                                                                      • Instruction ID: e6837ef4b496fec01ab68eb7bfb8f18b44b04dc215e6d9d489eea0742f783868
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e95ae93ed3c9accbb9b96efc98d80d94282711a25184a2725b8e0bf8299b06d1
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FE51D4B1900219ABDF15EBE0DD46EEEB7B9EF04340F208069F10972091DB396F98DB64
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                                                      • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                                                                                                                                                                                                      • API String ID: 1256254125-769500911
                                                                                                                                                                                                                                                      • Opcode ID: 66d03aed9c97e65250e896404fd060d165e5e18985ee1ce00302a9d8a51a4cb1
                                                                                                                                                                                                                                                      • Instruction ID: d294dca768e16374fb9382c1aff41213b4b5296bf061b9737bd997da5e609d52
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 66d03aed9c97e65250e896404fd060d165e5e18985ee1ce00302a9d8a51a4cb1
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2C41D532A001269BCB206F7DC9A05FEB7A5AFB0794B24412AE465DB2C4E739CDC1C790
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000001), ref: 007253A0
                                                                                                                                                                                                                                                      • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00725416
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00725420
                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000000,READY), ref: 007254A7
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Error$Mode$DiskFreeLastSpace
                                                                                                                                                                                                                                                      • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                                                                                                                                                                                                      • API String ID: 4194297153-14809454
                                                                                                                                                                                                                                                      • Opcode ID: 6fbcced46764f86402087712eb0eb3e9e3f9bdc1708b6abfe367f74e6195c85c
                                                                                                                                                                                                                                                      • Instruction ID: 4989cf53a29fb510a7ad3a72114f77538cabc910115e733c4930d88edffbcce5
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6fbcced46764f86402087712eb0eb3e9e3f9bdc1708b6abfe367f74e6195c85c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E931F275A006549FDB10EF68D484EEABBB4FF05305F14806AE905CB292DB79DD86CBA0
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CreateMenu.USER32 ref: 00743C79
                                                                                                                                                                                                                                                      • SetMenu.USER32(?,00000000), ref: 00743C88
                                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00743D10
                                                                                                                                                                                                                                                      • IsMenu.USER32(?), ref: 00743D24
                                                                                                                                                                                                                                                      • CreatePopupMenu.USER32 ref: 00743D2E
                                                                                                                                                                                                                                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00743D5B
                                                                                                                                                                                                                                                      • DrawMenuBar.USER32 ref: 00743D63
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                                                                                                                                                                                                      • String ID: 0$F
                                                                                                                                                                                                                                                      • API String ID: 161812096-3044882817
                                                                                                                                                                                                                                                      • Opcode ID: 242f47f4e2eda7a1a735ca1c7f244c4d0f6057b973352975fdee75aae33fffd1
                                                                                                                                                                                                                                                      • Instruction ID: 5df3707d540fbea053ea993bfde0cd178f2ba867148a7cfd3a2fc158fa307db6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 242f47f4e2eda7a1a735ca1c7f244c4d0f6057b973352975fdee75aae33fffd1
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BC415B79A01209AFDB14CF64D884AAEBBB5FF49351F144029F95A97360D738AA10CF94
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006B9CB3: _wcslen.LIBCMT ref: 006B9CBD
                                                                                                                                                                                                                                                        • Part of subcall function 00713CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00713CCA
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00711F64
                                                                                                                                                                                                                                                      • GetDlgCtrlID.USER32 ref: 00711F6F
                                                                                                                                                                                                                                                      • GetParent.USER32 ref: 00711F8B
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00711F8E
                                                                                                                                                                                                                                                      • GetDlgCtrlID.USER32(?), ref: 00711F97
                                                                                                                                                                                                                                                      • GetParent.USER32(?), ref: 00711FAB
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00711FAE
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                                                                                                                                                                                      • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                      • API String ID: 711023334-1403004172
                                                                                                                                                                                                                                                      • Opcode ID: 0fafba560b568f33ff3161245ee07857077e7b566366a66cc8a461fc04a320e9
                                                                                                                                                                                                                                                      • Instruction ID: 5aba253d8b691dd15fd190170b0000ad7a973908d89a7896cfc08c67fc5e572c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0fafba560b568f33ff3161245ee07857077e7b566366a66cc8a461fc04a320e9
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4821D3B4901114BBCF05AFA4CC84DEEBBB9AF06340F108546BA65672E1DB7849498B74
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00743A9D
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00743AA0
                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00743AC7
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00743AEA
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00743B62
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00743BAC
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00743BC7
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00743BE2
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00743BF6
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00743C13
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$LongWindow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 312131281-0
                                                                                                                                                                                                                                                      • Opcode ID: 5e61ed061bb50e34ac99766c8c673d60ef4029bc058e21ca6d7b5c52aecec862
                                                                                                                                                                                                                                                      • Instruction ID: 5e029cab18a3dcd13c0f260a8f1c96525fba64106c6ef5be94ba0c671ce5f979
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5e61ed061bb50e34ac99766c8c673d60ef4029bc058e21ca6d7b5c52aecec862
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 26617BB5900248AFDB11DFA8CC81EEE77B8EB09710F104199FA15E72A1C778AE45DF64
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 0071B151
                                                                                                                                                                                                                                                      • GetForegroundWindow.USER32(00000000,?,?,?,?,?,0071A1E1,?,00000001), ref: 0071B165
                                                                                                                                                                                                                                                      • GetWindowThreadProcessId.USER32(00000000), ref: 0071B16C
                                                                                                                                                                                                                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0071A1E1,?,00000001), ref: 0071B17B
                                                                                                                                                                                                                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 0071B18D
                                                                                                                                                                                                                                                      • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,0071A1E1,?,00000001), ref: 0071B1A6
                                                                                                                                                                                                                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0071A1E1,?,00000001), ref: 0071B1B8
                                                                                                                                                                                                                                                      • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,0071A1E1,?,00000001), ref: 0071B1FD
                                                                                                                                                                                                                                                      • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,0071A1E1,?,00000001), ref: 0071B212
                                                                                                                                                                                                                                                      • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,0071A1E1,?,00000001), ref: 0071B21D
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2156557900-0
                                                                                                                                                                                                                                                      • Opcode ID: 8e18ce43de426875b210c0056130ede996ed299960f373e47d0694e1f146db23
                                                                                                                                                                                                                                                      • Instruction ID: 132d55a4a1c57935d3023f31133f2f12380e3a1dc52669a7d2625cb5a62233a6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8e18ce43de426875b210c0056130ede996ed299960f373e47d0694e1f146db23
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5431C175541204BFDB119F6CDC59FAD7BAABB51711F21C005FA00DA1D0D7BC9A848F68
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006E2C94
                                                                                                                                                                                                                                                        • Part of subcall function 006E29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,006ED7D1,00000000,00000000,00000000,00000000,?,006ED7F8,00000000,00000007,00000000,?,006EDBF5,00000000), ref: 006E29DE
                                                                                                                                                                                                                                                        • Part of subcall function 006E29C8: GetLastError.KERNEL32(00000000,?,006ED7D1,00000000,00000000,00000000,00000000,?,006ED7F8,00000000,00000007,00000000,?,006EDBF5,00000000,00000000), ref: 006E29F0
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006E2CA0
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006E2CAB
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006E2CB6
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006E2CC1
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006E2CCC
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006E2CD7
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006E2CE2
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006E2CED
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006E2CFB
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 776569668-0
                                                                                                                                                                                                                                                      • Opcode ID: 62c54478eda431029f961ab5623a372eb874c2a6aa55f3b3a67ad08ad762ae34
                                                                                                                                                                                                                                                      • Instruction ID: d831c0e0e6ef2d5ec9aebfd09143ba3f42bfc5fa3175d283f4e1b532aaeabe33
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 62c54478eda431029f961ab5623a372eb874c2a6aa55f3b3a67ad08ad762ae34
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E711073610124DAFCB42EF56D852CDC3BABFF05740F4254A8F9485F222D635EE509B94
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00727FAD
                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00727FC1
                                                                                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(?), ref: 00727FEB
                                                                                                                                                                                                                                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00728005
                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00728017
                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00728060
                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 007280B0
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CurrentDirectory$AttributesFile
                                                                                                                                                                                                                                                      • String ID: *.*
                                                                                                                                                                                                                                                      • API String ID: 769691225-438819550
                                                                                                                                                                                                                                                      • Opcode ID: e40eb298e4804f73669955a7664c39ed12eaf90326b9440ac1bab830446443d0
                                                                                                                                                                                                                                                      • Instruction ID: 994b4e7182dfbffb3031aa8b0ff02178fde1c7ea454b2174f0de6a65eccd5cb2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e40eb298e4804f73669955a7664c39ed12eaf90326b9440ac1bab830446443d0
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C781F3729082509BCB68EF14D5449BEB3E9BF88310F154C5EF885C7250EB39DD44CB62
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000EB), ref: 006B5C7A
                                                                                                                                                                                                                                                        • Part of subcall function 006B5D0A: GetClientRect.USER32(?,?), ref: 006B5D30
                                                                                                                                                                                                                                                        • Part of subcall function 006B5D0A: GetWindowRect.USER32(?,?), ref: 006B5D71
                                                                                                                                                                                                                                                        • Part of subcall function 006B5D0A: ScreenToClient.USER32(?,?), ref: 006B5D99
                                                                                                                                                                                                                                                      • GetDC.USER32 ref: 006F46F5
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 006F4708
                                                                                                                                                                                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 006F4716
                                                                                                                                                                                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 006F472B
                                                                                                                                                                                                                                                      • ReleaseDC.USER32(?,00000000), ref: 006F4733
                                                                                                                                                                                                                                                      • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 006F47C4
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                                                                                                                                                                                      • String ID: U
                                                                                                                                                                                                                                                      • API String ID: 4009187628-3372436214
                                                                                                                                                                                                                                                      • Opcode ID: 3738e17a9aa78d743dd0c855bd808b393d04f962f6e6fa4977342992c2efb069
                                                                                                                                                                                                                                                      • Instruction ID: 7db6c372a4cc01e164c53cde0de5c2e7b86bb8ddc3e3a9e0a02496d12a148054
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3738e17a9aa78d743dd0c855bd808b393d04f962f6e6fa4977342992c2efb069
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F971E234400209DFCF219F64C984AFB7BB7FF4A360F144269EE565A666CB359882DF50
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 007235E4
                                                                                                                                                                                                                                                        • Part of subcall function 006B9CB3: _wcslen.LIBCMT ref: 006B9CBD
                                                                                                                                                                                                                                                      • LoadStringW.USER32(00782390,?,00000FFF,?), ref: 0072360A
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: LoadString$_wcslen
                                                                                                                                                                                                                                                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                                                                                                                                                                                                      • API String ID: 4099089115-2391861430
                                                                                                                                                                                                                                                      • Opcode ID: 0a163983cb00a756f10d779f9c17ba1c83027cbe3b791fc213c59734de5260c8
                                                                                                                                                                                                                                                      • Instruction ID: ded86ba23346224bbef0508415b91fa07cb450c6715cb7c8486c5da74e86ffef
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0a163983cb00a756f10d779f9c17ba1c83027cbe3b791fc213c59734de5260c8
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7151A0B1900219BBCF15EBA0DC82EEEBB79AF04300F544129F205721A1DB395BD9DFA4
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0072C272
                                                                                                                                                                                                                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0072C29A
                                                                                                                                                                                                                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0072C2CA
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 0072C322
                                                                                                                                                                                                                                                      • SetEvent.KERNEL32(?), ref: 0072C336
                                                                                                                                                                                                                                                      • InternetCloseHandle.WININET(00000000), ref: 0072C341
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3113390036-3916222277
                                                                                                                                                                                                                                                      • Opcode ID: 105e50f3ff8e697f38793be7edd4133da6dcf6a2c408512547ab1a591e00e591
                                                                                                                                                                                                                                                      • Instruction ID: ce2bc080ba518d6ee8652a6918eb03e964db9cac5c2e4dc3f3100ceca7aa2057
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 105e50f3ff8e697f38793be7edd4133da6dcf6a2c408512547ab1a591e00e591
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: EF31ADB1500614AFD723DF64AC88AAF7AFCEB6A740F10891EF44693201DB78DD048B61
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,006F3AAF,?,?,Bad directive syntax error,0074CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 007198BC
                                                                                                                                                                                                                                                      • LoadStringW.USER32(00000000,?,006F3AAF,?), ref: 007198C3
                                                                                                                                                                                                                                                        • Part of subcall function 006B9CB3: _wcslen.LIBCMT ref: 006B9CBD
                                                                                                                                                                                                                                                      • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00719987
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: HandleLoadMessageModuleString_wcslen
                                                                                                                                                                                                                                                      • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                                                                                                                                                                                      • API String ID: 858772685-4153970271
                                                                                                                                                                                                                                                      • Opcode ID: 0d76561c1e3d5020f75377411b227523f416f7e2d1e2555429ac3e5d67f6bceb
                                                                                                                                                                                                                                                      • Instruction ID: 54e3a64aae63e84b166dd599f2c5be8364389b669580f8b596940b3785da2f2e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0d76561c1e3d5020f75377411b227523f416f7e2d1e2555429ac3e5d67f6bceb
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E621947190021DFBCF55AF90CC1AEEE7776FF14340F048459F619650A2EB35A698CB24
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetParent.USER32 ref: 007120AB
                                                                                                                                                                                                                                                      • GetClassNameW.USER32(00000000,?,00000100), ref: 007120C0
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0071214D
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ClassMessageNameParentSend
                                                                                                                                                                                                                                                      • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                                                                                                                                                                                      • API String ID: 1290815626-3381328864
                                                                                                                                                                                                                                                      • Opcode ID: 0d7952c2f809dd21c59385beb2f5cd8b109e0c2c7db0ed20d076b3c50a9372a1
                                                                                                                                                                                                                                                      • Instruction ID: 7a9254753dbed41501303ff3d0ce6df32751dfd49aafcb9b6346deaf4f03032d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0d7952c2f809dd21c59385beb2f5cd8b109e0c2c7db0ed20d076b3c50a9372a1
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AD110DBA68470AB6FB156328DC06DFA379CCB05364B20411BFB04A51E2FFAD5C936518
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1282221369-0
                                                                                                                                                                                                                                                      • Opcode ID: ca93df6e0af6ed1b564dbddfd1fbd9fa2d3c10bef35cac371ac4f6046fc42f2b
                                                                                                                                                                                                                                                      • Instruction ID: 086ab4a2f821140772cdd8fd77e904749748a747fe97350b4dc157d384f9d77e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ca93df6e0af6ed1b564dbddfd1fbd9fa2d3c10bef35cac371ac4f6046fc42f2b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D6618B72A063C1AFDB21AFB79C51AA97B9BEF01330F14416DF8009B382D6359D0687A4
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00745186
                                                                                                                                                                                                                                                      • ShowWindow.USER32(?,00000000), ref: 007451C7
                                                                                                                                                                                                                                                      • ShowWindow.USER32(?,00000005,?,00000000), ref: 007451CD
                                                                                                                                                                                                                                                      • SetFocus.USER32(?,?,00000005,?,00000000), ref: 007451D1
                                                                                                                                                                                                                                                        • Part of subcall function 00746FBA: DeleteObject.GDI32(00000000), ref: 00746FE6
                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 0074520D
                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0074521A
                                                                                                                                                                                                                                                      • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0074524D
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00745287
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00745296
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3210457359-0
                                                                                                                                                                                                                                                      • Opcode ID: 00e42bb136be8d441d95e66c23f6f4e7ba87692bfa9b82ffafaadc227037d665
                                                                                                                                                                                                                                                      • Instruction ID: d5859c99a7e746a96d544947b1ffe84a2c2bd52013a99139661fa90f884f5b3d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 00e42bb136be8d441d95e66c23f6f4e7ba87692bfa9b82ffafaadc227037d665
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B6519F70A41A0CFFEF209F28CC49B993B65FB05321F148117F615962E2C7BDA980DB51
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00706890
                                                                                                                                                                                                                                                      • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 007068A9
                                                                                                                                                                                                                                                      • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 007068B9
                                                                                                                                                                                                                                                      • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 007068D1
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 007068F2
                                                                                                                                                                                                                                                      • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,006C8874,00000000,00000000,00000000,000000FF,00000000), ref: 00706901
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0070691E
                                                                                                                                                                                                                                                      • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,006C8874,00000000,00000000,00000000,000000FF,00000000), ref: 0070692D
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1268354404-0
                                                                                                                                                                                                                                                      • Opcode ID: a4a408ed4f9025a7e1d533f84fbed6eda9b9981cf5c5d1d799d7e945103ad91c
                                                                                                                                                                                                                                                      • Instruction ID: 5ef0c92aed200a493f0e52419bd1b4cd5f38b690385a2aed6f371513e71c8164
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a4a408ed4f9025a7e1d533f84fbed6eda9b9981cf5c5d1d799d7e945103ad91c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 44516670600209EFDB208F24CC55FAA7BB6EB58750F10861DF906972E0DB78EDA1DB54
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0072C182
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 0072C195
                                                                                                                                                                                                                                                      • SetEvent.KERNEL32(?), ref: 0072C1A9
                                                                                                                                                                                                                                                        • Part of subcall function 0072C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0072C272
                                                                                                                                                                                                                                                        • Part of subcall function 0072C253: GetLastError.KERNEL32 ref: 0072C322
                                                                                                                                                                                                                                                        • Part of subcall function 0072C253: SetEvent.KERNEL32(?), ref: 0072C336
                                                                                                                                                                                                                                                        • Part of subcall function 0072C253: InternetCloseHandle.WININET(00000000), ref: 0072C341
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 337547030-0
                                                                                                                                                                                                                                                      • Opcode ID: cbd2d79a2fc1dac4b8cf3a198a7e6cc4fa882baa41a224bb63c3afe23f3e3497
                                                                                                                                                                                                                                                      • Instruction ID: 5dec64629418de808f86c6ca9a4abff0b673a3ee06521f4b38d11e8f227d9c65
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: cbd2d79a2fc1dac4b8cf3a198a7e6cc4fa882baa41a224bb63c3afe23f3e3497
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E131AE75201615EFDB239FA5EC04A6ABBF8FF29300B04841EF95687610DB39E810DBA0
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 00713A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00713A57
                                                                                                                                                                                                                                                        • Part of subcall function 00713A3D: GetCurrentThreadId.KERNEL32 ref: 00713A5E
                                                                                                                                                                                                                                                        • Part of subcall function 00713A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,007125B3), ref: 00713A65
                                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 007125BD
                                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 007125DB
                                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 007125DF
                                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 007125E9
                                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00712601
                                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00712605
                                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 0071260F
                                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00712623
                                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00712627
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2014098862-0
                                                                                                                                                                                                                                                      • Opcode ID: f8a1a5a81d53f781d658e46ea7d3dc07d292791b5c1a3013cb82dc8f4d0c266c
                                                                                                                                                                                                                                                      • Instruction ID: aaed79de9e49aa02e8ebb21d737f1863ed21b7b19c83600cc71057a7c50be077
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f8a1a5a81d53f781d658e46ea7d3dc07d292791b5c1a3013cb82dc8f4d0c266c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2301D870391214BBFB1067689C8EF993F59DF4FB11F104042F318AE0D1CAE518458AAE
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00711449,?,?,00000000), ref: 0071180C
                                                                                                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000,?,00711449,?,?,00000000), ref: 00711813
                                                                                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00711449,?,?,00000000), ref: 00711828
                                                                                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(?,00000000,?,00711449,?,?,00000000), ref: 00711830
                                                                                                                                                                                                                                                      • DuplicateHandle.KERNEL32(00000000,?,00711449,?,?,00000000), ref: 00711833
                                                                                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00711449,?,?,00000000), ref: 00711843
                                                                                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(00711449,00000000,?,00711449,?,?,00000000), ref: 0071184B
                                                                                                                                                                                                                                                      • DuplicateHandle.KERNEL32(00000000,?,00711449,?,?,00000000), ref: 0071184E
                                                                                                                                                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,00711874,00000000,00000000,00000000), ref: 00711868
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1957940570-0
                                                                                                                                                                                                                                                      • Opcode ID: 7d7314d8804911dff4a82177bc18055bfe0c1e59cc34b0aa96480ada357d5b26
                                                                                                                                                                                                                                                      • Instruction ID: 25f60eeaecd85b84fcaa7b63c80a9cfc9d9c9d8453c56c07c6694ec65f4b3644
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7d7314d8804911dff4a82177bc18055bfe0c1e59cc34b0aa96480ada357d5b26
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5301BFB5241308BFE751AFA5DC4EF573B6CEB8AB11F418411FA05DB191C6749C00CB24
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: __alldvrm$_strrchr
                                                                                                                                                                                                                                                      • String ID: }}m$}}m$}}m
                                                                                                                                                                                                                                                      • API String ID: 1036877536-215773011
                                                                                                                                                                                                                                                      • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                                                                                                                                                                                                                      • Instruction ID: a60e3f90a38d13453b951dffb79caebc57116f7f9666c2d383fe17091bfefa60
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6DA14671D023D69FDB21CF2AC8917FABBE6EF66350F1441ADE5859B381CA348982C750
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 0071D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 0071D501
                                                                                                                                                                                                                                                        • Part of subcall function 0071D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 0071D50F
                                                                                                                                                                                                                                                        • Part of subcall function 0071D4DC: CloseHandle.KERNELBASE(00000000), ref: 0071D5DC
                                                                                                                                                                                                                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0073A16D
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 0073A180
                                                                                                                                                                                                                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0073A1B3
                                                                                                                                                                                                                                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 0073A268
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(00000000), ref: 0073A273
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 0073A2C4
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                                                                                                                                                                                      • String ID: SeDebugPrivilege
                                                                                                                                                                                                                                                      • API String ID: 2533919879-2896544425
                                                                                                                                                                                                                                                      • Opcode ID: 5f58d82fc6122f5915338b3fda231a889eceeda3f4d3da2e1f2143df81d8c841
                                                                                                                                                                                                                                                      • Instruction ID: 6c34c2ce58ba872d6306db29574f9d55e335b95e08ebb6edf1f50d3d93f377ce
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5f58d82fc6122f5915338b3fda231a889eceeda3f4d3da2e1f2143df81d8c841
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3861B171204241AFE710DF18C495F66BBE1AF84318F14848CE4A64B7A3C77AED85CB96
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00743925
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 0074393A
                                                                                                                                                                                                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00743954
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00743999
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001057,00000000,?), ref: 007439C6
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001061,?,0000000F), ref: 007439F4
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$Window_wcslen
                                                                                                                                                                                                                                                      • String ID: SysListView32
                                                                                                                                                                                                                                                      • API String ID: 2147712094-78025650
                                                                                                                                                                                                                                                      • Opcode ID: a364db9f1b224de7b06c3660595f73dae34345ee81ff072c4a7111bbfd22b17e
                                                                                                                                                                                                                                                      • Instruction ID: 34615bd157b1756825997ca5e69ffcb300990de2bcf97786c04077828e9b2e60
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a364db9f1b224de7b06c3660595f73dae34345ee81ff072c4a7111bbfd22b17e
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8541B571A00318ABEF219F64CC49FEA7BA9EF08354F10456AF958E7281D7799D80CB94
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0071BCFD
                                                                                                                                                                                                                                                      • IsMenu.USER32(00000000), ref: 0071BD1D
                                                                                                                                                                                                                                                      • CreatePopupMenu.USER32 ref: 0071BD53
                                                                                                                                                                                                                                                      • GetMenuItemCount.USER32(019055E0), ref: 0071BDA4
                                                                                                                                                                                                                                                      • InsertMenuItemW.USER32(019055E0,?,00000001,00000030), ref: 0071BDCC
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                                                                                                                                                                                                      • String ID: 0$2
                                                                                                                                                                                                                                                      • API String ID: 93392585-3793063076
                                                                                                                                                                                                                                                      • Opcode ID: ba1685334ab682698b2378f960772477646fb84656c5f0ae37141f99b2e4c874
                                                                                                                                                                                                                                                      • Instruction ID: 8715ab986d2d5e78b3bcd53fe494ea1b46e59ed14bacd30aa9775dabda105206
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ba1685334ab682698b2378f960772477646fb84656c5f0ae37141f99b2e4c874
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 65519070700205DBDB19CFACE889BEDBBF4AF49314F248159E491E72D0D778A981CB61
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • _ValidateLocalCookies.LIBCMT ref: 006D2D4B
                                                                                                                                                                                                                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 006D2D53
                                                                                                                                                                                                                                                      • _ValidateLocalCookies.LIBCMT ref: 006D2DE1
                                                                                                                                                                                                                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 006D2E0C
                                                                                                                                                                                                                                                      • _ValidateLocalCookies.LIBCMT ref: 006D2E61
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                                                                                                                                                                      • String ID: &Hm$csm
                                                                                                                                                                                                                                                      • API String ID: 1170836740-972173557
                                                                                                                                                                                                                                                      • Opcode ID: 01337779ccfebb4ac62c1f756822e166491050308c18d0b449d564657c16b73d
                                                                                                                                                                                                                                                      • Instruction ID: aabbd29d94f4ad1587e489600f5bf2fbc6e790ee92dbf189739e721fd370bc1f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 01337779ccfebb4ac62c1f756822e166491050308c18d0b449d564657c16b73d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 21419534E0021A9BCF10DF68C855ADEBBB7BF55314F14815AE814AB392D7359A05CBD1
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • LoadIconW.USER32(00000000,00007F03), ref: 0071C913
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: IconLoad
                                                                                                                                                                                                                                                      • String ID: blank$info$question$stop$warning
                                                                                                                                                                                                                                                      • API String ID: 2457776203-404129466
                                                                                                                                                                                                                                                      • Opcode ID: 2c6504ca634087fb63a1aa8f705c24b6352278096964e1fd860820845dcb7e39
                                                                                                                                                                                                                                                      • Instruction ID: 16121e5c00f46ed1f26826a26935287cec77e64590d89ffea5d9717b0189f65f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2c6504ca634087fb63a1aa8f705c24b6352278096964e1fd860820845dcb7e39
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A5112E716C9706BFA706579C9CC3CEE279CDF153A4B10402FF504AA2C1DB7C6D805268
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                                                                                                                                                                                                                      • String ID: 0.0.0.0
                                                                                                                                                                                                                                                      • API String ID: 642191829-3771769585
                                                                                                                                                                                                                                                      • Opcode ID: 3b313c7b1068a26021ad0dd3a6ca2a48f4e3a41c4fae49f9d948a20e9919e3cf
                                                                                                                                                                                                                                                      • Instruction ID: 75e82e1cc4e0c3bec499d5189b650ca41afea24db0ed8f55a11d51ad1e616b29
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3b313c7b1068a26021ad0dd3a6ca2a48f4e3a41c4fae49f9d948a20e9919e3cf
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 63113371904108ABCB71AB389C0AEEE37ADDF11312F00016AF405AA1D1EF78CEC48E64
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: _wcslen$LocalTime
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 952045576-0
                                                                                                                                                                                                                                                      • Opcode ID: 4b843081a879f384bd1118254d93f856e3642425cbead6d451930eb3eb90ce8e
                                                                                                                                                                                                                                                      • Instruction ID: 15174b7ce81b080e6a75b44caba578adb207e34c4a27555d95502b52784f00fd
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4b843081a879f384bd1118254d93f856e3642425cbead6d451930eb3eb90ce8e
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4141B265C1011866CB51EBB4CC8A9CFB3A9AF45300F00846BFA14E3262FB34E745C3E9
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0070682C,00000004,00000000,00000000), ref: 006CF953
                                                                                                                                                                                                                                                      • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,0070682C,00000004,00000000,00000000), ref: 0070F3D1
                                                                                                                                                                                                                                                      • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0070682C,00000004,00000000,00000000), ref: 0070F454
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ShowWindow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1268545403-0
                                                                                                                                                                                                                                                      • Opcode ID: 9b392c8af5e00c3e1f2028f051c52658bd7255d43e33da4391552732417e3d22
                                                                                                                                                                                                                                                      • Instruction ID: 8df2839a51703fde9ca5551b9e0162085dc632840296337e9ee0464b0d9fcf54
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9b392c8af5e00c3e1f2028f051c52658bd7255d43e33da4391552732417e3d22
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 55410B31604680FACF799B29C888F7ABBD7EB57314F14853EF44796AA0C739A881C751
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 00742D1B
                                                                                                                                                                                                                                                      • GetDC.USER32(00000000), ref: 00742D23
                                                                                                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00742D2E
                                                                                                                                                                                                                                                      • ReleaseDC.USER32(00000000,00000000), ref: 00742D3A
                                                                                                                                                                                                                                                      • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00742D76
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00742D87
                                                                                                                                                                                                                                                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00745A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00742DC2
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00742DE1
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3864802216-0
                                                                                                                                                                                                                                                      • Opcode ID: ea69923605eb8e7e0a43fb22d5e75ba468690fb2b4f7220a0f2fc55d0b2cdd61
                                                                                                                                                                                                                                                      • Instruction ID: 1d5fff87927699ba3ba26d008b70311c3ad08642ed6f6ebe662fd0ece5c989ed
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ea69923605eb8e7e0a43fb22d5e75ba468690fb2b4f7220a0f2fc55d0b2cdd61
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 40317176202614BFEB154F50CC49FEB3FA9EF0A715F048056FE089A1A1C7799C51CBA5
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: _memcmp
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2931989736-0
                                                                                                                                                                                                                                                      • Opcode ID: e99b8f75366bff7ede4608c42025d7e75bb23dd0c9fcd12d7e794c16405fcbe4
                                                                                                                                                                                                                                                      • Instruction ID: 643f31d8a3433a9523e4a1b5d2a2245364aabb31f3bf018ae94d3bced4f68700
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e99b8f75366bff7ede4608c42025d7e75bb23dd0c9fcd12d7e794c16405fcbe4
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 982198B1A40905FBD31C55295D92FFA235DAFA2784B440025FD045A6C2FB68ED5082E9
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: NULL Pointer assignment$Not an Object type
                                                                                                                                                                                                                                                      • API String ID: 0-572801152
                                                                                                                                                                                                                                                      • Opcode ID: 4b30b0e5af98dbf950afbb059ac948e6a73b84b72376e90a433b079e9d71f8f1
                                                                                                                                                                                                                                                      • Instruction ID: 0c0cddcfc2d6e0e1ff37dbc25bc47ee85bb3656234550114dcb805ef2a7a88f6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4b30b0e5af98dbf950afbb059ac948e6a73b84b72376e90a433b079e9d71f8f1
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: EED1D6B1A0060A9FEF14CFA8C881FAEB7B5FF48344F148069E915AB282D775DD41CB90
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetCPInfo.KERNEL32(?,?), ref: 006F15CE
                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 006F1651
                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 006F16E4
                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 006F16FB
                                                                                                                                                                                                                                                        • Part of subcall function 006E3820: RtlAllocateHeap.NTDLL(00000000,?,00781444,?,006CFDF5,?,?,006BA976,00000010,00781440,006B13FC,?,006B13C6,?,006B1129), ref: 006E3852
                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 006F1777
                                                                                                                                                                                                                                                      • __freea.LIBCMT ref: 006F17A2
                                                                                                                                                                                                                                                      • __freea.LIBCMT ref: 006F17AE
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2829977744-0
                                                                                                                                                                                                                                                      • Opcode ID: 27da0a6b8c2198de5da3a261f1a985914481cff629ee698bacc47783be003309
                                                                                                                                                                                                                                                      • Instruction ID: 445dd104d4fe2a240b7624fcefe25b43d8500be2db6363672527d9d8d04fed03
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 27da0a6b8c2198de5da3a261f1a985914481cff629ee698bacc47783be003309
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C891C4B1E0021EDADF209E74C891AFE7BB6AF4A390F184659EA05EF251D735DC41CB60
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Variant$ClearInit
                                                                                                                                                                                                                                                      • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                                                                                                                                                                                      • API String ID: 2610073882-625585964
                                                                                                                                                                                                                                                      • Opcode ID: 29f3acee8f17cfc13b5cea1ad6030125a7ada8c69ba9b6d2b8e94a009827b81a
                                                                                                                                                                                                                                                      • Instruction ID: b145a95e06cc893cd670fc2d37afef69988778e6a78f353aa5a71b316b9c300f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 29f3acee8f17cfc13b5cea1ad6030125a7ada8c69ba9b6d2b8e94a009827b81a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E3919471A00219EBEF28CFA4CC45FAE7BB8EF46714F108559F505AB281D778A941CFA0
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 0072125C
                                                                                                                                                                                                                                                      • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00721284
                                                                                                                                                                                                                                                      • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 007212A8
                                                                                                                                                                                                                                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 007212D8
                                                                                                                                                                                                                                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 0072135F
                                                                                                                                                                                                                                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 007213C4
                                                                                                                                                                                                                                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00721430
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2550207440-0
                                                                                                                                                                                                                                                      • Opcode ID: 171ed7bad87be08b9e686df88e3c1f46eccfe2279b4f6f13a0030644a97d277e
                                                                                                                                                                                                                                                      • Instruction ID: b7bbf7d0c5eadb48d70f8e36541a92f2bf319f9ad1ae5e85c14b4e1f4c339826
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 171ed7bad87be08b9e686df88e3c1f46eccfe2279b4f6f13a0030644a97d277e
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2F91F475A00229DFDB00DFA8E884BBE77B6FF55324F514029E900E7291D77CA941CBA4
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ObjectSelect$BeginCreatePath
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3225163088-0
                                                                                                                                                                                                                                                      • Opcode ID: 65ac1adaecb2801d0f27924e83aac239306ec3b57b2cffbe8395ac0f4c62ebe2
                                                                                                                                                                                                                                                      • Instruction ID: 93f5ed3c5222834db9b89418675ae30d20dfa39689adb71d91d36e7a3e92996f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 65ac1adaecb2801d0f27924e83aac239306ec3b57b2cffbe8395ac0f4c62ebe2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 69913671D00219EFCB15CFA9CC88AEEBBB9FF49320F148159E515B7291D378A942CB60
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • VariantInit.OLEAUT32(?), ref: 0073396B
                                                                                                                                                                                                                                                      • CharUpperBuffW.USER32(?,?), ref: 00733A7A
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00733A8A
                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00733C1F
                                                                                                                                                                                                                                                        • Part of subcall function 00720CDF: VariantInit.OLEAUT32(00000000), ref: 00720D1F
                                                                                                                                                                                                                                                        • Part of subcall function 00720CDF: VariantCopy.OLEAUT32(?,?), ref: 00720D28
                                                                                                                                                                                                                                                        • Part of subcall function 00720CDF: VariantClear.OLEAUT32(?), ref: 00720D34
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                                                                                                                                                                                                      • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                                                                                                                                                                                      • API String ID: 4137639002-1221869570
                                                                                                                                                                                                                                                      • Opcode ID: 4571a6b7a968215f96f4436d950660dedc0d5658f892a5aef2dcdd0fa90b1484
                                                                                                                                                                                                                                                      • Instruction ID: fa12f85095fb97e532dd6efecbab244f532bd5316c1493aadcddbb58232b66fe
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4571a6b7a968215f96f4436d950660dedc0d5658f892a5aef2dcdd0fa90b1484
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A19167B56083019FC714DF28C48196AB7E5FF89314F14882DF88A9B352DB39EE45CB92
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 0071000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0070FF41,80070057,?,?,?,0071035E), ref: 0071002B
                                                                                                                                                                                                                                                        • Part of subcall function 0071000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0070FF41,80070057,?,?), ref: 00710046
                                                                                                                                                                                                                                                        • Part of subcall function 0071000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0070FF41,80070057,?,?), ref: 00710054
                                                                                                                                                                                                                                                        • Part of subcall function 0071000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0070FF41,80070057,?), ref: 00710064
                                                                                                                                                                                                                                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00734C51
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00734D59
                                                                                                                                                                                                                                                      • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00734DCF
                                                                                                                                                                                                                                                      • CoTaskMemFree.OLE32(?), ref: 00734DDA
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                                                                                                                                                                                                      • String ID: NULL Pointer assignment
                                                                                                                                                                                                                                                      • API String ID: 614568839-2785691316
                                                                                                                                                                                                                                                      • Opcode ID: b0542325775b2dda0996beff0cfc6ca316c7281b2607c208473922c5426973e4
                                                                                                                                                                                                                                                      • Instruction ID: ba5a5757a5a00bb07855848c8b3ff3211126e4651acfe1350c1271ef2c8b8bd5
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b0542325775b2dda0996beff0cfc6ca316c7281b2607c208473922c5426973e4
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 129107B1D00219AFDF14DFA4C891AEEB7B9BF08310F10856AE915A7251DB34AA45CFA0
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetMenu.USER32(?), ref: 00742183
                                                                                                                                                                                                                                                      • GetMenuItemCount.USER32(00000000), ref: 007421B5
                                                                                                                                                                                                                                                      • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 007421DD
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00742213
                                                                                                                                                                                                                                                      • GetMenuItemID.USER32(?,?), ref: 0074224D
                                                                                                                                                                                                                                                      • GetSubMenu.USER32(?,?), ref: 0074225B
                                                                                                                                                                                                                                                        • Part of subcall function 00713A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00713A57
                                                                                                                                                                                                                                                        • Part of subcall function 00713A3D: GetCurrentThreadId.KERNEL32 ref: 00713A5E
                                                                                                                                                                                                                                                        • Part of subcall function 00713A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,007125B3), ref: 00713A65
                                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 007422E3
                                                                                                                                                                                                                                                        • Part of subcall function 0071E97B: Sleep.KERNEL32 ref: 0071E9F3
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 4196846111-0
                                                                                                                                                                                                                                                      • Opcode ID: 72987c16fbf8773249370cec64a7bf0c3fbb013652b3bc6c3f1085a21433570b
                                                                                                                                                                                                                                                      • Instruction ID: a5efb07abee6c3bdeb1243675a8b581c2f4eb88f7e6b6353ef3ae0dcfac4e29c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 72987c16fbf8773249370cec64a7bf0c3fbb013652b3bc6c3f1085a21433570b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 57718175A00205AFCB50DF64C845AAEB7F6FF89310F518459F816EB352DB78ED428B90
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • IsWindow.USER32(019055B8), ref: 00747F37
                                                                                                                                                                                                                                                      • IsWindowEnabled.USER32(019055B8), ref: 00747F43
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 0074801E
                                                                                                                                                                                                                                                      • SendMessageW.USER32(019055B8,000000B0,?,?), ref: 00748051
                                                                                                                                                                                                                                                      • IsDlgButtonChecked.USER32(?,?), ref: 00748089
                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(019055B8,000000EC), ref: 007480AB
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 007480C3
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 4072528602-0
                                                                                                                                                                                                                                                      • Opcode ID: 54b5509ca2abd41ed31a6dc5bd87e74289b3fb2f09fd52e072ab52923f40fe14
                                                                                                                                                                                                                                                      • Instruction ID: 735ff528875693d29cdb19113c9d00d29adfcaa18f1e712b5da3aed36b98b8da
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 54b5509ca2abd41ed31a6dc5bd87e74289b3fb2f09fd52e072ab52923f40fe14
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5E71A334608208AFEB29DF54CC84FBE7BB9EF0A300F14445AF94557261CB39AC4ADB11
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetParent.USER32(?), ref: 0071AEF9
                                                                                                                                                                                                                                                      • GetKeyboardState.USER32(?), ref: 0071AF0E
                                                                                                                                                                                                                                                      • SetKeyboardState.USER32(?), ref: 0071AF6F
                                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000101,00000010,?), ref: 0071AF9D
                                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000101,00000011,?), ref: 0071AFBC
                                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000101,00000012,?), ref: 0071AFFD
                                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000101,0000005B,?), ref: 0071B020
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 87235514-0
                                                                                                                                                                                                                                                      • Opcode ID: 7af5cdc573d45b7c3ac3b8be34aa509260e7dc45aba4d80460c0c69a8e280647
                                                                                                                                                                                                                                                      • Instruction ID: 0d13e62d4cfcbbedc54c99bb4bbf229b97b0f34aee13a6cfdad07f47047db57f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7af5cdc573d45b7c3ac3b8be34aa509260e7dc45aba4d80460c0c69a8e280647
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4451B3A06057D53DFB3682388C49BFA7EA95B06304F088589F1D9554C2C3ACEDC9D761
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetParent.USER32(00000000), ref: 0071AD19
                                                                                                                                                                                                                                                      • GetKeyboardState.USER32(?), ref: 0071AD2E
                                                                                                                                                                                                                                                      • SetKeyboardState.USER32(?), ref: 0071AD8F
                                                                                                                                                                                                                                                      • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 0071ADBB
                                                                                                                                                                                                                                                      • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 0071ADD8
                                                                                                                                                                                                                                                      • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 0071AE17
                                                                                                                                                                                                                                                      • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 0071AE38
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 87235514-0
                                                                                                                                                                                                                                                      • Opcode ID: 4c1a08fda6a73300d763cafc73d98dddd11678dc4c50cc780352026f9a8c9620
                                                                                                                                                                                                                                                      • Instruction ID: 93a520f0ea1c79b5e69e7eae274fc3e2d42fc1e7b9b70b14eee4bf28d1380188
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4c1a08fda6a73300d763cafc73d98dddd11678dc4c50cc780352026f9a8c9620
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3D51D7A16057D53DFB3783388C56BFA7EA96B46300F088589E1D5468C2D3ACECD8D752
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetConsoleCP.KERNEL32(006F3CD6,?,?,?,?,?,?,?,?,006E5BA3,?,?,006F3CD6,?,?), ref: 006E5470
                                                                                                                                                                                                                                                      • __fassign.LIBCMT ref: 006E54EB
                                                                                                                                                                                                                                                      • __fassign.LIBCMT ref: 006E5506
                                                                                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,006F3CD6,00000005,00000000,00000000), ref: 006E552C
                                                                                                                                                                                                                                                      • WriteFile.KERNEL32(?,006F3CD6,00000000,006E5BA3,00000000,?,?,?,?,?,?,?,?,?,006E5BA3,?), ref: 006E554B
                                                                                                                                                                                                                                                      • WriteFile.KERNEL32(?,?,00000001,006E5BA3,00000000,?,?,?,?,?,?,?,?,?,006E5BA3,?), ref: 006E5584
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1324828854-0
                                                                                                                                                                                                                                                      • Opcode ID: df4848d3edda679db74b1bc5743c96aab233fefac24f2f257ac10cca4ee6c478
                                                                                                                                                                                                                                                      • Instruction ID: d319719fb412ad35f286643af46aa8654f3b7501c81a7b02dbf36d7a6b715b64
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: df4848d3edda679db74b1bc5743c96aab233fefac24f2f257ac10cca4ee6c478
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3751F6B0A017889FDB11CFA9D845AEEBBF6EF09304F24405AF556E7391E7309A41CB64
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 0073304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0073307A
                                                                                                                                                                                                                                                        • Part of subcall function 0073304E: _wcslen.LIBCMT ref: 0073309B
                                                                                                                                                                                                                                                      • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00731112
                                                                                                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 00731121
                                                                                                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 007311C9
                                                                                                                                                                                                                                                      • closesocket.WSOCK32(00000000), ref: 007311F9
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2675159561-0
                                                                                                                                                                                                                                                      • Opcode ID: 4dfcf43c93c6eb42513084cb9d584186ecbc678b996c219a74e660c14612d8ab
                                                                                                                                                                                                                                                      • Instruction ID: b7cf8732e7410b4a2fb27b387ba18ac08fcb8caaedc5d2b4e46381deaff23314
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4dfcf43c93c6eb42513084cb9d584186ecbc678b996c219a74e660c14612d8ab
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 83410535600218AFEB119F14C884BEAB7EAEF45324F14C059FD059B292C778EE81CBE5
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 0071DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0071CF22,?), ref: 0071DDFD
                                                                                                                                                                                                                                                        • Part of subcall function 0071DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0071CF22,?), ref: 0071DE16
                                                                                                                                                                                                                                                      • lstrcmpiW.KERNEL32(?,?), ref: 0071CF45
                                                                                                                                                                                                                                                      • MoveFileW.KERNEL32(?,?), ref: 0071CF7F
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 0071D005
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 0071D01B
                                                                                                                                                                                                                                                      • SHFileOperationW.SHELL32(?), ref: 0071D061
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                                                                                                                                                                                                      • String ID: \*.*
                                                                                                                                                                                                                                                      • API String ID: 3164238972-1173974218
                                                                                                                                                                                                                                                      • Opcode ID: 8f8e26c9d7ca1af20fe4e1ed542c688c88d6643f863365dc77697314116bcbfe
                                                                                                                                                                                                                                                      • Instruction ID: a726eb2b3e87afd940c2d0449847c3145ccbfaf17483e8d61dbe0768b8e187f0
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8f8e26c9d7ca1af20fe4e1ed542c688c88d6643f863365dc77697314116bcbfe
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 294166729451189FDF12EFA8D981ADD77BDAF08380F1400EAE505EB181EB38AA85CB54
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00742E1C
                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00742E4F
                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00742E84
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00742EB6
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00742EE0
                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00742EF1
                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00742F0B
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: LongWindow$MessageSend
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2178440468-0
                                                                                                                                                                                                                                                      • Opcode ID: ab881e99e480e1679cb8bd91c17967906cc54e406f0bebba68073278e47e5f15
                                                                                                                                                                                                                                                      • Instruction ID: 053d7ec035027f27bd06b526f77ef85b2787272bb33d8ef4cb5d67269703134c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ab881e99e480e1679cb8bd91c17967906cc54e406f0bebba68073278e47e5f15
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B2315734645160AFDB21CF18DC88F6537E4FB4A710FA680A5F9148F2B2CB79AC52DB05
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00717769
                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0071778F
                                                                                                                                                                                                                                                      • SysAllocString.OLEAUT32(00000000), ref: 00717792
                                                                                                                                                                                                                                                      • SysAllocString.OLEAUT32(?), ref: 007177B0
                                                                                                                                                                                                                                                      • SysFreeString.OLEAUT32(?), ref: 007177B9
                                                                                                                                                                                                                                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 007177DE
                                                                                                                                                                                                                                                      • SysAllocString.OLEAUT32(?), ref: 007177EC
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3761583154-0
                                                                                                                                                                                                                                                      • Opcode ID: 66255b32e080aaa85f3478fed8e07f8a21f7938f08f7a95bca5a8e2c1c60aa95
                                                                                                                                                                                                                                                      • Instruction ID: 5e3540b6ba8636a3ee5bd31280bf1acb681788203163d2203ef4bad2341bd4b0
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 66255b32e080aaa85f3478fed8e07f8a21f7938f08f7a95bca5a8e2c1c60aa95
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8621DE7A604209AFDB00EFACCC88CFB77ACEB09360B008026BA15DB1D0D678DC81C764
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00717842
                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00717868
                                                                                                                                                                                                                                                      • SysAllocString.OLEAUT32(00000000), ref: 0071786B
                                                                                                                                                                                                                                                      • SysAllocString.OLEAUT32 ref: 0071788C
                                                                                                                                                                                                                                                      • SysFreeString.OLEAUT32 ref: 00717895
                                                                                                                                                                                                                                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 007178AF
                                                                                                                                                                                                                                                      • SysAllocString.OLEAUT32(?), ref: 007178BD
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3761583154-0
                                                                                                                                                                                                                                                      • Opcode ID: 3e559e8276bc37344239e0e2c3cc22b118e93a881689dfe76d7f61aea61aabd0
                                                                                                                                                                                                                                                      • Instruction ID: c9b96fdc156db6eec65125814a64dd848f399d0f23453f1fc08dd7da00cb5948
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3e559e8276bc37344239e0e2c3cc22b118e93a881689dfe76d7f61aea61aabd0
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2D216075609204AFDB14AFACDC88DEA77BCEB097607108125F915CB2A1DB78DC81CB78
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetStdHandle.KERNEL32(0000000C), ref: 007204F2
                                                                                                                                                                                                                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0072052E
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CreateHandlePipe
                                                                                                                                                                                                                                                      • String ID: nul
                                                                                                                                                                                                                                                      • API String ID: 1424370930-2873401336
                                                                                                                                                                                                                                                      • Opcode ID: 168cd48d608dcbc6af130ddce8715ed3691fdc970f4da8df956aaa65eeb91b62
                                                                                                                                                                                                                                                      • Instruction ID: d0a571306c8edfffde3e619425e6c09ad88ee6c74346df5fef5929a54ee34713
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 168cd48d608dcbc6af130ddce8715ed3691fdc970f4da8df956aaa65eeb91b62
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D32162756003199BDB209F2AEC44E5A77F4BF45724F204A19F8A1D61E1D7B49960CFB0
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetStdHandle.KERNEL32(000000F6), ref: 007205C6
                                                                                                                                                                                                                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00720601
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CreateHandlePipe
                                                                                                                                                                                                                                                      • String ID: nul
                                                                                                                                                                                                                                                      • API String ID: 1424370930-2873401336
                                                                                                                                                                                                                                                      • Opcode ID: 749c2ec1e94ec93bfd3fd2e2859ab10aec7abb41caecc051191c342de1a7b386
                                                                                                                                                                                                                                                      • Instruction ID: 4e3120ad60b51f5c5ab2d09a8b20f72d4c70e47c8aa3c89428e49a2f5f022263
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 749c2ec1e94ec93bfd3fd2e2859ab10aec7abb41caecc051191c342de1a7b386
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7021B5755003259FDB208F69EC08A5A77F4BF85720F204A19F8A1E32E1D7B89860CBB0
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006B600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 006B604C
                                                                                                                                                                                                                                                        • Part of subcall function 006B600E: GetStockObject.GDI32(00000011), ref: 006B6060
                                                                                                                                                                                                                                                        • Part of subcall function 006B600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 006B606A
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00744112
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0074411F
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0074412A
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00744139
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00744145
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$CreateObjectStockWindow
                                                                                                                                                                                                                                                      • String ID: Msctls_Progress32
                                                                                                                                                                                                                                                      • API String ID: 1025951953-3636473452
                                                                                                                                                                                                                                                      • Opcode ID: 027e147c606b81761712a7b95371a9a135db57a472c42edefc3c2eafbbdf9f08
                                                                                                                                                                                                                                                      • Instruction ID: 42fb90c5941a3c0f80eb4c642c2e48051a2c61afdc8542114d8244000e5d4644
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 027e147c606b81761712a7b95371a9a135db57a472c42edefc3c2eafbbdf9f08
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8B11B2B214021DBEEF119F64CC86EE77F9DEF09798F018111BA18A2050C7769C61DBA4
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006ED7A3: _free.LIBCMT ref: 006ED7CC
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006ED82D
                                                                                                                                                                                                                                                        • Part of subcall function 006E29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,006ED7D1,00000000,00000000,00000000,00000000,?,006ED7F8,00000000,00000007,00000000,?,006EDBF5,00000000), ref: 006E29DE
                                                                                                                                                                                                                                                        • Part of subcall function 006E29C8: GetLastError.KERNEL32(00000000,?,006ED7D1,00000000,00000000,00000000,00000000,?,006ED7F8,00000000,00000007,00000000,?,006EDBF5,00000000,00000000), ref: 006E29F0
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006ED838
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006ED843
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006ED897
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006ED8A2
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006ED8AD
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006ED8B8
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 776569668-0
                                                                                                                                                                                                                                                      • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                                                                                                                                                                                                      • Instruction ID: b941bb4c90bf183b418bef4db555d500211facf1544339635078ce54a5f8e861
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 63115171542B88AAD9A1BFB2CC47FCB7BDF6F00700F40082DB699AA093DA69F5054654
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0071DA74
                                                                                                                                                                                                                                                      • LoadStringW.USER32(00000000), ref: 0071DA7B
                                                                                                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0071DA91
                                                                                                                                                                                                                                                      • LoadStringW.USER32(00000000), ref: 0071DA98
                                                                                                                                                                                                                                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0071DADC
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      • %s (%d) : ==> %s: %s %s, xrefs: 0071DAB9
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: HandleLoadModuleString$Message
                                                                                                                                                                                                                                                      • String ID: %s (%d) : ==> %s: %s %s
                                                                                                                                                                                                                                                      • API String ID: 4072794657-3128320259
                                                                                                                                                                                                                                                      • Opcode ID: d7c614e53abe825bab9fc080f53110bc05b2933712a65d8ac716d321fb986356
                                                                                                                                                                                                                                                      • Instruction ID: ce798c4c2fbfab8a1808cd29de22ad08b722ffb33bdd3586387161969f252312
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d7c614e53abe825bab9fc080f53110bc05b2933712a65d8ac716d321fb986356
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 940186F6500208BFE752DBA49D89EF7336CEB09701F4084A2B706E2081EB789E844F75
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • InterlockedExchange.KERNEL32(018FE7C8,018FE7C8), ref: 0072097B
                                                                                                                                                                                                                                                      • EnterCriticalSection.KERNEL32(018FE7A8,00000000), ref: 0072098D
                                                                                                                                                                                                                                                      • TerminateThread.KERNEL32(?,000001F6), ref: 0072099B
                                                                                                                                                                                                                                                      • WaitForSingleObject.KERNEL32(?,000003E8), ref: 007209A9
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 007209B8
                                                                                                                                                                                                                                                      • InterlockedExchange.KERNEL32(018FE7C8,000001F6), ref: 007209C8
                                                                                                                                                                                                                                                      • LeaveCriticalSection.KERNEL32(018FE7A8), ref: 007209CF
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3495660284-0
                                                                                                                                                                                                                                                      • Opcode ID: 8f55d187642a7c6420c7717b94e82cba7afa682a82b809ec4aa8bbd0a28f59b5
                                                                                                                                                                                                                                                      • Instruction ID: 2a6de8320286383b8b32855c127df87a8d4f3b104283865640e518b016f78b3f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8f55d187642a7c6420c7717b94e82cba7afa682a82b809ec4aa8bbd0a28f59b5
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C4F0E135543912BBD7925F94EE8DBD67B35FF06702F405016F102508A1C7B9A465CFA4
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 006B5D30
                                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 006B5D71
                                                                                                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 006B5D99
                                                                                                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 006B5ED7
                                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 006B5EF8
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Rect$Client$Window$Screen
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1296646539-0
                                                                                                                                                                                                                                                      • Opcode ID: bb77ed90203e03c4a0bbe4a08ccb385e992492fd4b26ac5e646c5fae80f5a044
                                                                                                                                                                                                                                                      • Instruction ID: 84693a267d8dfc7b1dc4b331484ef2f4393f3d0bd3d314f7094f943318621689
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bb77ed90203e03c4a0bbe4a08ccb385e992492fd4b26ac5e646c5fae80f5a044
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D6B16A74A0064ADBDB10CFA8C4407FAB7F2FF48310F14851AE9AAD7650DB34EA92DB54
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • __allrem.LIBCMT ref: 006E00BA
                                                                                                                                                                                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006E00D6
                                                                                                                                                                                                                                                      • __allrem.LIBCMT ref: 006E00ED
                                                                                                                                                                                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006E010B
                                                                                                                                                                                                                                                      • __allrem.LIBCMT ref: 006E0122
                                                                                                                                                                                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006E0140
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1992179935-0
                                                                                                                                                                                                                                                      • Opcode ID: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                                                                                                                                                                                                                      • Instruction ID: b84babdb8ac1dcdb4c2b2f4ae3afd2fb6aa053fa908de7b5de01e4aed26f3574
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0E81E772A027469BE720AF6ACC41BAB73EBAF41364F24453EF551DA3C1E7B0D9408794
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 00733149: select.WSOCK32(00000000,?,00000000,00000000,?,?,?,00000000,?,?,?,0073101C,00000000,?,?,00000000), ref: 00733195
                                                                                                                                                                                                                                                      • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00731DC0
                                                                                                                                                                                                                                                      • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00731DE1
                                                                                                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 00731DF2
                                                                                                                                                                                                                                                      • inet_ntoa.WSOCK32(?), ref: 00731E8C
                                                                                                                                                                                                                                                      • htons.WSOCK32(?,?,?,?,?), ref: 00731EDB
                                                                                                                                                                                                                                                      • _strlen.LIBCMT ref: 00731F35
                                                                                                                                                                                                                                                        • Part of subcall function 007139E8: _strlen.LIBCMT ref: 007139F2
                                                                                                                                                                                                                                                        • Part of subcall function 006B6D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000002,?,?,?,?,006CCF58,?,?,?), ref: 006B6DBA
                                                                                                                                                                                                                                                        • Part of subcall function 006B6D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,?,?,?,006CCF58,?,?,?), ref: 006B6DED
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ByteCharMultiWide_strlen$ErrorLasthtonsinet_ntoaselect
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1923757996-0
                                                                                                                                                                                                                                                      • Opcode ID: bc94c72b2f35b486f1fbfd657790edccfc23ddbed6d08fa5d853dce7add426c4
                                                                                                                                                                                                                                                      • Instruction ID: 927ff75058aba4b90f7f26cfed0479b43417a999366e2d6dc9efa30430d5fac1
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bc94c72b2f35b486f1fbfd657790edccfc23ddbed6d08fa5d853dce7add426c4
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 64A1E271204301AFE324DF24C885F6A77E6AF85318F94894CF4565B2A3CB35ED82CB91
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,006D82D9,006D82D9,?,?,?,006E644F,00000001,00000001,8BE85006), ref: 006E6258
                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,006E644F,00000001,00000001,8BE85006,?,?,?), ref: 006E62DE
                                                                                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 006E63D8
                                                                                                                                                                                                                                                      • __freea.LIBCMT ref: 006E63E5
                                                                                                                                                                                                                                                        • Part of subcall function 006E3820: RtlAllocateHeap.NTDLL(00000000,?,00781444,?,006CFDF5,?,?,006BA976,00000010,00781440,006B13FC,?,006B13C6,?,006B1129), ref: 006E3852
                                                                                                                                                                                                                                                      • __freea.LIBCMT ref: 006E63EE
                                                                                                                                                                                                                                                      • __freea.LIBCMT ref: 006E6413
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1414292761-0
                                                                                                                                                                                                                                                      • Opcode ID: 44d59f4fbbb13c85331d06928b3373677f9a74f2de6e9e06db5ea3cfed145c08
                                                                                                                                                                                                                                                      • Instruction ID: c1e4ff22871238eb0faffaedc4a24d895b99364bab1f10af799ac0f7e8ef96ac
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 44d59f4fbbb13c85331d06928b3373677f9a74f2de6e9e06db5ea3cfed145c08
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E751D172602396AFDB258F66CC81EEF77ABEB64790F144629F905D7280EB34DD40C660
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006B9CB3: _wcslen.LIBCMT ref: 006B9CBD
                                                                                                                                                                                                                                                        • Part of subcall function 0073C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0073B6AE,?,?), ref: 0073C9B5
                                                                                                                                                                                                                                                        • Part of subcall function 0073C998: _wcslen.LIBCMT ref: 0073C9F1
                                                                                                                                                                                                                                                        • Part of subcall function 0073C998: _wcslen.LIBCMT ref: 0073CA68
                                                                                                                                                                                                                                                        • Part of subcall function 0073C998: _wcslen.LIBCMT ref: 0073CA9E
                                                                                                                                                                                                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0073BCCA
                                                                                                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0073BD25
                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 0073BD6A
                                                                                                                                                                                                                                                      • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0073BD99
                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0073BDF3
                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 0073BDFF
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1120388591-0
                                                                                                                                                                                                                                                      • Opcode ID: 497d1c9e7e70903728e74333972c888b3598bd3fd3eacd829de36306227706cf
                                                                                                                                                                                                                                                      • Instruction ID: 7603cc30749d086f830eaa1ee58943a5a354e63c9ddc498824e4688574e3613b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 497d1c9e7e70903728e74333972c888b3598bd3fd3eacd829de36306227706cf
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D481F170218241EFE714DF24C881E6ABBE5FF84308F14885DF55A4B2A2DB36ED45CB92
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • VariantInit.OLEAUT32(00000035), ref: 0070F7B9
                                                                                                                                                                                                                                                      • SysAllocString.OLEAUT32(00000001), ref: 0070F860
                                                                                                                                                                                                                                                      • VariantCopy.OLEAUT32(0070FA64,00000000), ref: 0070F889
                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(0070FA64), ref: 0070F8AD
                                                                                                                                                                                                                                                      • VariantCopy.OLEAUT32(0070FA64,00000000), ref: 0070F8B1
                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 0070F8BB
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Variant$ClearCopy$AllocInitString
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3859894641-0
                                                                                                                                                                                                                                                      • Opcode ID: f621e02c32e051962198d22989f06e6efbfeee2316f9b093a063093a0feddf78
                                                                                                                                                                                                                                                      • Instruction ID: e210fc634b9b96329e3cd2bfb73bc1c9cdd56f43b3ccd051ea9f771fc26badd5
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f621e02c32e051962198d22989f06e6efbfeee2316f9b093a063093a0feddf78
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 91513731611300FACF70AF65D885B69B3E5EF45310B20952BE802DF6D1DB789C40CBAA
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006B7620: _wcslen.LIBCMT ref: 006B7625
                                                                                                                                                                                                                                                        • Part of subcall function 006B6B57: _wcslen.LIBCMT ref: 006B6B6A
                                                                                                                                                                                                                                                      • GetOpenFileNameW.COMDLG32(00000058), ref: 007294E5
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00729506
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 0072952D
                                                                                                                                                                                                                                                      • GetSaveFileNameW.COMDLG32(00000058), ref: 00729585
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: _wcslen$FileName$OpenSave
                                                                                                                                                                                                                                                      • String ID: X
                                                                                                                                                                                                                                                      • API String ID: 83654149-3081909835
                                                                                                                                                                                                                                                      • Opcode ID: 62fac6e6b78b43dd4c3f15fb534caac00c69fdc75211d06d0ef6e6c02dbd09b9
                                                                                                                                                                                                                                                      • Instruction ID: 6f41b2d6e96fcfa11a06b79445ca2861b5d300fd4248b448c738d9d6612184dd
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 62fac6e6b78b43dd4c3f15fb534caac00c69fdc75211d06d0ef6e6c02dbd09b9
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D6E1D171604350DFD764EF24D881AAAB7E1FF84310F08896DF9899B2A2DB34DD44CB96
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 006C9BB2
                                                                                                                                                                                                                                                      • BeginPaint.USER32(?,?,?), ref: 006C9241
                                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 006C92A5
                                                                                                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 006C92C2
                                                                                                                                                                                                                                                      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 006C92D3
                                                                                                                                                                                                                                                      • EndPaint.USER32(?,?,?,?,?), ref: 006C9321
                                                                                                                                                                                                                                                      • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 007071EA
                                                                                                                                                                                                                                                        • Part of subcall function 006C9339: BeginPath.GDI32(00000000), ref: 006C9357
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3050599898-0
                                                                                                                                                                                                                                                      • Opcode ID: 5e9eba9e7093073b8a02b1592cbfd562eb5b55796f845ef9bb7384b2decbd3cd
                                                                                                                                                                                                                                                      • Instruction ID: 6f642cb45c87de5122a1f3971705ab3c4797cfa8905868996e1c7dad3602be8f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5e9eba9e7093073b8a02b1592cbfd562eb5b55796f845ef9bb7384b2decbd3cd
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DE41AC70105240EFD711DF24CC88FBA7BE9EB8A320F14466DF994872E1C739A846DB66
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • InterlockedExchange.KERNEL32(?,000001F5), ref: 0072080C
                                                                                                                                                                                                                                                      • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00720847
                                                                                                                                                                                                                                                      • EnterCriticalSection.KERNEL32(?), ref: 00720863
                                                                                                                                                                                                                                                      • LeaveCriticalSection.KERNEL32(?), ref: 007208DC
                                                                                                                                                                                                                                                      • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 007208F3
                                                                                                                                                                                                                                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 00720921
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3368777196-0
                                                                                                                                                                                                                                                      • Opcode ID: 6f03a648e0aa38ab8e4891332ca038067d6bb4102106efa10c952f702e4f4d7b
                                                                                                                                                                                                                                                      • Instruction ID: aebd1f3e1dbe023c72f9e71f2d93b7fa8ccfb138f4992965e0898360d4046a46
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6f03a648e0aa38ab8e4891332ca038067d6bb4102106efa10c952f702e4f4d7b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CF41AD71900205EFDF55AF54DC85A6A77BAFF04300F1080A9ED009A297DB74EE60DBA8
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,0070F3AB,00000000,?,?,00000000,?,0070682C,00000004,00000000,00000000), ref: 0074824C
                                                                                                                                                                                                                                                      • EnableWindow.USER32(?,00000000), ref: 00748272
                                                                                                                                                                                                                                                      • ShowWindow.USER32(FFFFFFFF,00000000), ref: 007482D1
                                                                                                                                                                                                                                                      • ShowWindow.USER32(?,00000004), ref: 007482E5
                                                                                                                                                                                                                                                      • EnableWindow.USER32(?,00000001), ref: 0074830B
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0074832F
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$Show$Enable$MessageSend
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 642888154-0
                                                                                                                                                                                                                                                      • Opcode ID: e3874f482160d7ade33daf27a04f6d469f9dc294ef94cdc6f7ca8b768f89a61f
                                                                                                                                                                                                                                                      • Instruction ID: 3e7c3e8a31130ae500826585f7cd0066e8f65c822e1568092624ca3995a0a736
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e3874f482160d7ade33daf27a04f6d469f9dc294ef94cdc6f7ca8b768f89a61f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FA41C634601648EFDB52CF14C899BEC7BE0FB0A714F1882A9E5184F272CB79AC41CB56
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • IsWindowVisible.USER32(?), ref: 00714C95
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00714CB2
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00714CEA
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00714D08
                                                                                                                                                                                                                                                      • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00714D10
                                                                                                                                                                                                                                                      • _wcsstr.LIBVCRUNTIME ref: 00714D1A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 72514467-0
                                                                                                                                                                                                                                                      • Opcode ID: 714e66864d9c6b2aa9dbdaac10457e9ccf2e3d768fceaf91b63d066e5358f406
                                                                                                                                                                                                                                                      • Instruction ID: f93f564bdec42050b3f7f4b2d24d43adbb0666a141874104708d831fbc3b0179
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 714e66864d9c6b2aa9dbdaac10457e9ccf2e3d768fceaf91b63d066e5358f406
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BA212976605200BBEB555B39EC09EBB7B9DDF46750F10C06EF905CA1D2EF69CC4092A0
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006B3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006B3A97,?,?,006B2E7F,?,?,?,00000000), ref: 006B3AC2
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 0072587B
                                                                                                                                                                                                                                                      • CoInitialize.OLE32(00000000), ref: 00725995
                                                                                                                                                                                                                                                      • CoCreateInstance.OLE32(0074FCF8,00000000,00000001,0074FB68,?), ref: 007259AE
                                                                                                                                                                                                                                                      • CoUninitialize.OLE32 ref: 007259CC
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                                                                                                                                                                                                      • String ID: .lnk
                                                                                                                                                                                                                                                      • API String ID: 3172280962-24824748
                                                                                                                                                                                                                                                      • Opcode ID: 87741839ce5985d0cdb342e178e55d83b759cd297f13510d0c004787984755fd
                                                                                                                                                                                                                                                      • Instruction ID: dca79d87dc8c4c642d36b417e42a6891f4b8f55a3adc902240639268099bd92b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 87741839ce5985d0cdb342e178e55d83b759cd297f13510d0c004787984755fd
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4BD163B16047219FC714DF24D484A6ABBE6EF89310F14885DF8899B361DB35EC85CB92
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 00710FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00710FCA
                                                                                                                                                                                                                                                        • Part of subcall function 00710FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00710FD6
                                                                                                                                                                                                                                                        • Part of subcall function 00710FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00710FE5
                                                                                                                                                                                                                                                        • Part of subcall function 00710FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00710FEC
                                                                                                                                                                                                                                                        • Part of subcall function 00710FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00711002
                                                                                                                                                                                                                                                      • GetLengthSid.ADVAPI32(?,00000000,00711335), ref: 007117AE
                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,00000000), ref: 007117BA
                                                                                                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000), ref: 007117C1
                                                                                                                                                                                                                                                      • CopySid.ADVAPI32(00000000,00000000,?), ref: 007117DA
                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000,00711335), ref: 007117EE
                                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 007117F5
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3008561057-0
                                                                                                                                                                                                                                                      • Opcode ID: 312eaf2065618c90114b61c5a40ee07f35802a60ab284a3f72fc516c7ccda25b
                                                                                                                                                                                                                                                      • Instruction ID: 157ac32ac2aa87c65c3abe0a7c54d3a9a07c5d6fdf8c05a46b2dd33e1995af7a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 312eaf2065618c90114b61c5a40ee07f35802a60ab284a3f72fc516c7ccda25b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9211BE75502209FFDB119FA8CC49BEE7BA9EB42355F508019F541AB290D739AD80CB60
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 007114FF
                                                                                                                                                                                                                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 00711506
                                                                                                                                                                                                                                                      • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00711515
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000004), ref: 00711520
                                                                                                                                                                                                                                                      • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0071154F
                                                                                                                                                                                                                                                      • DestroyEnvironmentBlock.USERENV(00000000), ref: 00711563
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1413079979-0
                                                                                                                                                                                                                                                      • Opcode ID: 87d1abaee8fdc496b7158e31eac1684735dfba70abf9b0b956c8aace191f6896
                                                                                                                                                                                                                                                      • Instruction ID: df46bb4c941551ac9692039af2ebd65d15e797b23fe7742506265aeb0055a1b4
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 87d1abaee8fdc496b7158e31eac1684735dfba70abf9b0b956c8aace191f6896
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DA115976602249ABDF128F98DD49BDE7BA9EF49704F048015FE05A60A0C3798EA0DB61
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,?,006D3379,006D2FE5), ref: 006D3390
                                                                                                                                                                                                                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 006D339E
                                                                                                                                                                                                                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 006D33B7
                                                                                                                                                                                                                                                      • SetLastError.KERNEL32(00000000,?,006D3379,006D2FE5), ref: 006D3409
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorLastValue___vcrt_
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3852720340-0
                                                                                                                                                                                                                                                      • Opcode ID: 4b104c97d1b2520b30a6f06b7e5d2da852a9186d4a564a7e7625baf56f0af120
                                                                                                                                                                                                                                                      • Instruction ID: 861ed255a4c90b27c9c1b4a5aedbd35e18eb84bef24797c7dfad35e5995e64ad
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4b104c97d1b2520b30a6f06b7e5d2da852a9186d4a564a7e7625baf56f0af120
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: ED012832E09371BFA6562B757C855962A96EB193B5320422FF410843F0EF154D02918E
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,?,006E5686,006F3CD6,?,00000000,?,006E5B6A,?,?,?,?,?,006DE6D1,?,00778A48), ref: 006E2D78
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006E2DAB
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006E2DD3
                                                                                                                                                                                                                                                      • SetLastError.KERNEL32(00000000,?,?,?,?,006DE6D1,?,00778A48,00000010,006B4F4A,?,?,00000000,006F3CD6), ref: 006E2DE0
                                                                                                                                                                                                                                                      • SetLastError.KERNEL32(00000000,?,?,?,?,006DE6D1,?,00778A48,00000010,006B4F4A,?,?,00000000,006F3CD6), ref: 006E2DEC
                                                                                                                                                                                                                                                      • _abort.LIBCMT ref: 006E2DF2
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorLast$_free$_abort
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3160817290-0
                                                                                                                                                                                                                                                      • Opcode ID: 0958e86a9e7cdc24263057238549a68063e658e2246cfc6bb3987ee96270089f
                                                                                                                                                                                                                                                      • Instruction ID: f7ceb0d60cbb0a733e9efffc7ec4bf03abe61a746bf0d2081ec287a48b9f073c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0958e86a9e7cdc24263057238549a68063e658e2246cfc6bb3987ee96270089f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4FF0F93550778227C29327376C2BA5A165FAFC2BA0F21841DF624D22D2EF2888014169
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006C9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 006C9693
                                                                                                                                                                                                                                                        • Part of subcall function 006C9639: SelectObject.GDI32(?,00000000), ref: 006C96A2
                                                                                                                                                                                                                                                        • Part of subcall function 006C9639: BeginPath.GDI32(?), ref: 006C96B9
                                                                                                                                                                                                                                                        • Part of subcall function 006C9639: SelectObject.GDI32(?,00000000), ref: 006C96E2
                                                                                                                                                                                                                                                      • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00748A4E
                                                                                                                                                                                                                                                      • LineTo.GDI32(?,00000003,00000000), ref: 00748A62
                                                                                                                                                                                                                                                      • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00748A70
                                                                                                                                                                                                                                                      • LineTo.GDI32(?,00000000,00000003), ref: 00748A80
                                                                                                                                                                                                                                                      • EndPath.GDI32(?), ref: 00748A90
                                                                                                                                                                                                                                                      • StrokePath.GDI32(?), ref: 00748AA0
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 43455801-0
                                                                                                                                                                                                                                                      • Opcode ID: be62455d2f79a24395ea614d48d35bd4d85df327a135e8c58656ec17def80065
                                                                                                                                                                                                                                                      • Instruction ID: f61082fa166856ab39b7be288f33a24ae669de3300d189de810b2614955ae3cb
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: be62455d2f79a24395ea614d48d35bd4d85df327a135e8c58656ec17def80065
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FA11057604114CFFEB129F90DC88EAA7F6DEB09350F04C022FA199A1B1C775AD55DBA4
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetDC.USER32(00000000), ref: 00715218
                                                                                                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000,00000058), ref: 00715229
                                                                                                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00715230
                                                                                                                                                                                                                                                      • ReleaseDC.USER32(00000000,00000000), ref: 00715238
                                                                                                                                                                                                                                                      • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0071524F
                                                                                                                                                                                                                                                      • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00715261
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CapsDevice$Release
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1035833867-0
                                                                                                                                                                                                                                                      • Opcode ID: 598699b9638e65f9d7880ca2bbecf23f43af97701cf47b0f779e703f974964ae
                                                                                                                                                                                                                                                      • Instruction ID: 8eb2eaccffbec0a432611db6cb2d0a765d0c3f69dca4e6be3741e21e2a71cd30
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 598699b9638e65f9d7880ca2bbecf23f43af97701cf47b0f779e703f974964ae
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E7018FB5A01708FBEB119BA59C49A4EBFB8FB49351F048066FA04A7290D7749800CBA5
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(0000005B,00000000), ref: 006B1BF4
                                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000010,00000000), ref: 006B1BFC
                                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(000000A0,00000000), ref: 006B1C07
                                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(000000A1,00000000), ref: 006B1C12
                                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000011,00000000), ref: 006B1C1A
                                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 006B1C22
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Virtual
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 4278518827-0
                                                                                                                                                                                                                                                      • Opcode ID: 12855113abd4c554237314376d9ebb7e576b77fb06fb431aa8275de5fa5bebeb
                                                                                                                                                                                                                                                      • Instruction ID: 6f3027d95448e41e70f1df62d51112f8eaccce9cb737411c69673f422667e316
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 12855113abd4c554237314376d9ebb7e576b77fb06fb431aa8275de5fa5bebeb
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 740167B0902B5ABDE3008F6A8C85B52FFA8FF19354F00415BA15C4BA42C7F5A864CFE5
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0071EB30
                                                                                                                                                                                                                                                      • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0071EB46
                                                                                                                                                                                                                                                      • GetWindowThreadProcessId.USER32(?,?), ref: 0071EB55
                                                                                                                                                                                                                                                      • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0071EB64
                                                                                                                                                                                                                                                      • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0071EB6E
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0071EB75
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 839392675-0
                                                                                                                                                                                                                                                      • Opcode ID: 34488d0709ef32daa8f881cdcbd49213602b5595903d52dda56c51346b94e6c6
                                                                                                                                                                                                                                                      • Instruction ID: e6c1432c9ac560d9b28f4a94b95632ca2ceba8d0e53da876a503acd1e9313379
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 34488d0709ef32daa8f881cdcbd49213602b5595903d52dda56c51346b94e6c6
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 37F0B4B6202158BBE7225B529C0EEEF3E7CEFCBB11F00815AF601D1090D7A81A01C6B9
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetClientRect.USER32(?), ref: 00707452
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001328,00000000,?), ref: 00707469
                                                                                                                                                                                                                                                      • GetWindowDC.USER32(?), ref: 00707475
                                                                                                                                                                                                                                                      • GetPixel.GDI32(00000000,?,?), ref: 00707484
                                                                                                                                                                                                                                                      • ReleaseDC.USER32(?,00000000), ref: 00707496
                                                                                                                                                                                                                                                      • GetSysColor.USER32(00000005), ref: 007074B0
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 272304278-0
                                                                                                                                                                                                                                                      • Opcode ID: 6e9ffd27583694c0dbf1f0042d55eab5f12c9b3e319403b5ae7b05710168de0f
                                                                                                                                                                                                                                                      • Instruction ID: ec4b305b8132f7d29e81a4e0049183e0ddfa230e0a27932789db85ad9c0324d7
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6e9ffd27583694c0dbf1f0042d55eab5f12c9b3e319403b5ae7b05710168de0f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9101AD35801205FFDB925FA4DC08BAE7BB5FF05311F618165F915A20E1CB392E51EB19
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0071187F
                                                                                                                                                                                                                                                      • UnloadUserProfile.USERENV(?,?), ref: 0071188B
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00711894
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 0071189C
                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 007118A5
                                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 007118AC
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 146765662-0
                                                                                                                                                                                                                                                      • Opcode ID: ccdfdcc4665a9fbbd823f151f48db67e56d9123de3676405e115bae90e3ba281
                                                                                                                                                                                                                                                      • Instruction ID: 76be0479996f9f7d3e0e95e8dba084f90a90909402857d348f8e29548dd1148b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ccdfdcc4665a9fbbd823f151f48db67e56d9123de3676405e115bae90e3ba281
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 74E0E57A206105BBDB425FA1ED0C90ABF39FF4AB22B10C222F22581070CB369820DF58
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • __Init_thread_footer.LIBCMT ref: 006BBEB3
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Init_thread_footer
                                                                                                                                                                                                                                                      • String ID: D%x$D%x$D%x$D%xD%x
                                                                                                                                                                                                                                                      • API String ID: 1385522511-2836779441
                                                                                                                                                                                                                                                      • Opcode ID: bec86df1a508cb279ca76cf89fa21a257fae3202d1417faccef804b932de1330
                                                                                                                                                                                                                                                      • Instruction ID: 8344bc8041d6e6812edf2aa23ce39e651316c0db78fa2ceb5f9aa6c39a9f378d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bec86df1a508cb279ca76cf89fa21a257fae3202d1417faccef804b932de1330
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C49149B5A0020ACFCB18CF59C4916E9BBF2FF58310F24916AD945AB351D7B5ED82CB90
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006D0242: EnterCriticalSection.KERNEL32(0078070C,00781884,?,?,006C198B,00782518,?,?,?,006B12F9,00000000), ref: 006D024D
                                                                                                                                                                                                                                                        • Part of subcall function 006D0242: LeaveCriticalSection.KERNEL32(0078070C,?,006C198B,00782518,?,?,?,006B12F9,00000000), ref: 006D028A
                                                                                                                                                                                                                                                        • Part of subcall function 006B9CB3: _wcslen.LIBCMT ref: 006B9CBD
                                                                                                                                                                                                                                                        • Part of subcall function 006D00A3: __onexit.LIBCMT ref: 006D00A9
                                                                                                                                                                                                                                                      • __Init_thread_footer.LIBCMT ref: 00737BFB
                                                                                                                                                                                                                                                        • Part of subcall function 006D01F8: EnterCriticalSection.KERNEL32(0078070C,?,?,006C8747,00782514), ref: 006D0202
                                                                                                                                                                                                                                                        • Part of subcall function 006D01F8: LeaveCriticalSection.KERNEL32(0078070C,?,006C8747,00782514), ref: 006D0235
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                                                                                                                                                                                                                      • String ID: +Tp$5$G$Variable must be of type 'Object'.
                                                                                                                                                                                                                                                      • API String ID: 535116098-1816105312
                                                                                                                                                                                                                                                      • Opcode ID: a97df36e4da783f8ff51d2f4dafbb2d3fa76c00fe39dae748e0390678b2f4459
                                                                                                                                                                                                                                                      • Instruction ID: 2759620fef11465a9f61b4c9294c23489362dce0d80e9d9e707c09c155e6b70e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a97df36e4da783f8ff51d2f4dafbb2d3fa76c00fe39dae748e0390678b2f4459
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 99915DB0A04209EFDB28EF94D8959BDB7B6FF45300F10805DF8065B292DB79AE41CB51
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006B7620: _wcslen.LIBCMT ref: 006B7625
                                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0071C6EE
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 0071C735
                                                                                                                                                                                                                                                      • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0071C79C
                                                                                                                                                                                                                                                      • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0071C7CA
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ItemMenu$Info_wcslen$Default
                                                                                                                                                                                                                                                      • String ID: 0
                                                                                                                                                                                                                                                      • API String ID: 1227352736-4108050209
                                                                                                                                                                                                                                                      • Opcode ID: 1752904bd776fd868c8245bb065cf43b79cc6f2927738b858d3e9b9f373a3f96
                                                                                                                                                                                                                                                      • Instruction ID: 04c4500989ee233b4dd653e62cff5f977e30c9a6a84ac3ff2bc3114d03f135d0
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1752904bd776fd868c8245bb065cf43b79cc6f2927738b858d3e9b9f373a3f96
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B051DF716843409BD752AFACC885BFBB7E8AF49310F040A2DF995D31D0DBA8D884CB56
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • ShellExecuteExW.SHELL32(0000003C), ref: 0073AEA3
                                                                                                                                                                                                                                                        • Part of subcall function 006B7620: _wcslen.LIBCMT ref: 006B7625
                                                                                                                                                                                                                                                      • GetProcessId.KERNEL32(00000000), ref: 0073AF38
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 0073AF67
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                                                                                                                                                                                                      • String ID: <$@
                                                                                                                                                                                                                                                      • API String ID: 146682121-1426351568
                                                                                                                                                                                                                                                      • Opcode ID: d246a8cc22373da0c86f630127b654f63be0e817cebff28459ce35a79cc19e02
                                                                                                                                                                                                                                                      • Instruction ID: c42105cfeff3aa338a5c90698019a42c3984db49bedbf6e538c2053f52c4659a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d246a8cc22373da0c86f630127b654f63be0e817cebff28459ce35a79cc19e02
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 74715871A00215EFDB14DF54C486A9EBBF1AF08310F04849DE856AB3A2DB79ED81CB95
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00717206
                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0071723C
                                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0071724D
                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 007172CF
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorMode$AddressCreateInstanceProc
                                                                                                                                                                                                                                                      • String ID: DllGetClassObject
                                                                                                                                                                                                                                                      • API String ID: 753597075-1075368562
                                                                                                                                                                                                                                                      • Opcode ID: 777215d2de8360c74617dc342f46523331b955ef0aca23300bf4b7ac16a64804
                                                                                                                                                                                                                                                      • Instruction ID: 1858592394b807712952d8255fe48720fac197c8a5322893ebfa2a247aaf6574
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 777215d2de8360c74617dc342f46523331b955ef0aca23300bf4b7ac16a64804
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F84162B1604204DFDB19CF58C884ADA7BB9FF49310F1480ADBD059F24AD7B9D985DBA0
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00743E35
                                                                                                                                                                                                                                                      • IsMenu.USER32(?), ref: 00743E4A
                                                                                                                                                                                                                                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00743E92
                                                                                                                                                                                                                                                      • DrawMenuBar.USER32 ref: 00743EA5
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Menu$Item$DrawInfoInsert
                                                                                                                                                                                                                                                      • String ID: 0
                                                                                                                                                                                                                                                      • API String ID: 3076010158-4108050209
                                                                                                                                                                                                                                                      • Opcode ID: 0624662c9fe82bf1e8b6d162c0a5ed5280429e18fc6afddde1da2f574f7ab36f
                                                                                                                                                                                                                                                      • Instruction ID: b66054be13e13af7f49af586427ced02d00f172b4290daec97f14f6a08f9bee3
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0624662c9fe82bf1e8b6d162c0a5ed5280429e18fc6afddde1da2f574f7ab36f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 30418974A02219EFDB10DF50D880EEABBB9FF49350F148029F819A7250D338AE51CF60
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006B9CB3: _wcslen.LIBCMT ref: 006B9CBD
                                                                                                                                                                                                                                                        • Part of subcall function 00713CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00713CCA
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00711E66
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00711E79
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000189,?,00000000), ref: 00711EA9
                                                                                                                                                                                                                                                        • Part of subcall function 006B6B57: _wcslen.LIBCMT ref: 006B6B6A
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$_wcslen$ClassName
                                                                                                                                                                                                                                                      • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                      • API String ID: 2081771294-1403004172
                                                                                                                                                                                                                                                      • Opcode ID: 5e8f1f25161f12d7fd8cf787a11cc6c4a7826d47713838bd21d9c2737aec38f2
                                                                                                                                                                                                                                                      • Instruction ID: 386883bbdba43a17de32ae681e5aab5d71501ad25c161c17479d8990c576e159
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5e8f1f25161f12d7fd8cf787a11cc6c4a7826d47713838bd21d9c2737aec38f2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 832137B1A00104BADB14ABA8CC45CFFB7B9DF46350B54851DF925A71E1DB3C49898730
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: _wcslen
                                                                                                                                                                                                                                                      • String ID: HKEY_LOCAL_MACHINE$HKLM
                                                                                                                                                                                                                                                      • API String ID: 176396367-4004644295
                                                                                                                                                                                                                                                      • Opcode ID: b184a1ec81e4f8176bf9cba2efbcb2355e9172725875729eff7fa50d36c06a5e
                                                                                                                                                                                                                                                      • Instruction ID: bfd03d9d0d10f0dfc884f8c3a65fba60727ff9f5f50ae2f1dbcfa005905dbc38
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b184a1ec81e4f8176bf9cba2efbcb2355e9172725875729eff7fa50d36c06a5e
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DC31FB73A001694BEB22EF6C8D501BE33925B61790F15C029E845BB346EA79CD40D3E4
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00742F8D
                                                                                                                                                                                                                                                      • LoadLibraryW.KERNEL32(?), ref: 00742F94
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00742FA9
                                                                                                                                                                                                                                                      • DestroyWindow.USER32(?), ref: 00742FB1
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                                                                                                                                                                                                      • String ID: SysAnimate32
                                                                                                                                                                                                                                                      • API String ID: 3529120543-1011021900
                                                                                                                                                                                                                                                      • Opcode ID: 1fc89bc7832817a6b94e59ee7531ee7b9ab25c8d2e74fa47e2bccb1666c4dd34
                                                                                                                                                                                                                                                      • Instruction ID: 442e50befd009e8f3a2e5f38b8958c93deca049740b5e6055f7e7ac962712598
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1fc89bc7832817a6b94e59ee7531ee7b9ab25c8d2e74fa47e2bccb1666c4dd34
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5D21FD71200209ABEF118F64DC80EBB37BDEB59364FD08619FA10D20A2C379DCA69764
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,006D4D1E,006E28E9,?,006D4CBE,006E28E9,007788B8,0000000C,006D4E15,006E28E9,00000002), ref: 006D4D8D
                                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 006D4DA0
                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,006D4D1E,006E28E9,?,006D4CBE,006E28E9,007788B8,0000000C,006D4E15,006E28E9,00000002,00000000), ref: 006D4DC3
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                                                                                                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                                                                                                                                                                                                      • API String ID: 4061214504-1276376045
                                                                                                                                                                                                                                                      • Opcode ID: dbd02a2e27da07148e97ee35bf77b80061f8bd975e8d60e9e80909057654fe45
                                                                                                                                                                                                                                                      • Instruction ID: 7ff035dbe406c4bd6eee74a2ca349491fd4d1275202220fe76c52461039eab69
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: dbd02a2e27da07148e97ee35bf77b80061f8bd975e8d60e9e80909057654fe45
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B0F0A434901208BBDB515F90DC09BDDBFB6EF09752F04409AF805A2350DF745D40CAD4
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • LoadLibraryA.KERNEL32 ref: 0070D3AD
                                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0070D3BF
                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000), ref: 0070D3E5
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                                                                      • String ID: GetSystemWow64DirectoryW$X64
                                                                                                                                                                                                                                                      • API String ID: 145871493-2590602151
                                                                                                                                                                                                                                                      • Opcode ID: f05d742c8416aae263b864c4b924f13be8b812acc00d024824a9fe28b9830367
                                                                                                                                                                                                                                                      • Instruction ID: 5247d4b4d654eb4d7a004b1aca4ea2c79b05ebecf80c9615db9741e627a0b6a8
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f05d742c8416aae263b864c4b924f13be8b812acc00d024824a9fe28b9830367
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AFF05CB5402710DBD77617948C08E29F796BF02701B54C36AF401E10C4D72CCD40C787
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?,006B4EDD,?,00781418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 006B4E9C
                                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 006B4EAE
                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,006B4EDD,?,00781418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 006B4EC0
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                                                                      • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                                                                                                                                                                                      • API String ID: 145871493-3689287502
                                                                                                                                                                                                                                                      • Opcode ID: 1a3f88c2656a9d70af82ffb25f0ef8bec280c4f4d4086c8d59cc5ad5768df5fd
                                                                                                                                                                                                                                                      • Instruction ID: fc77306ef960486453f42d937e218fd9a3fb4b33c1fbf2ff624b0c5a8eac14c4
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1a3f88c2656a9d70af82ffb25f0ef8bec280c4f4d4086c8d59cc5ad5768df5fd
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 89E0CDF9A036225BD27317296C18BDF6955AF83F627054116FC04D2302DF68CD42C6A5
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?,006F3CDE,?,00781418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 006B4E62
                                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 006B4E74
                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,006F3CDE,?,00781418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 006B4E87
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                                                                      • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                                                                                                                                                                                      • API String ID: 145871493-1355242751
                                                                                                                                                                                                                                                      • Opcode ID: 46b33b0f94231595d832cf4f35b5ab519fd79d5f6b3a73b37cada2594daf34de
                                                                                                                                                                                                                                                      • Instruction ID: 596535d7796003a8b6776993995481ef4151b82afefa9381e106f91e02e3ee3b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 46b33b0f94231595d832cf4f35b5ab519fd79d5f6b3a73b37cada2594daf34de
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: EAD0C2F9503A21574A631B246C08DCB2B1AAF83B513058112B804A2211CF28CD42C6E4
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00722C05
                                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?), ref: 00722C87
                                                                                                                                                                                                                                                      • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00722C9D
                                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00722CAE
                                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00722CC0
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: File$Delete$Copy
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3226157194-0
                                                                                                                                                                                                                                                      • Opcode ID: 5421772da68082eaa9a5f304a2a6ae0c3b0878e83d627f8d555608d6389c2980
                                                                                                                                                                                                                                                      • Instruction ID: 213892372d10109c70462af8e007599e21a1790e2a5604d03e8dfcfec13fc0da
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5421772da68082eaa9a5f304a2a6ae0c3b0878e83d627f8d555608d6389c2980
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4AB16FB1D00129ABDF11EFA4DC85EDE777DEF09340F1040AAF509E6142EA34DA458F65
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetCurrentProcessId.KERNEL32 ref: 0073A427
                                                                                                                                                                                                                                                      • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0073A435
                                                                                                                                                                                                                                                      • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0073A468
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 0073A63D
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Process$CloseCountersCurrentHandleOpen
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3488606520-0
                                                                                                                                                                                                                                                      • Opcode ID: 60fdc9fa88683b8280861ef97ce4da3627572e359e241165f2faac0ef9089028
                                                                                                                                                                                                                                                      • Instruction ID: 3ee6ed62504224f779fa3485c42c93d3389d50d45182a9a8a512af251e8b800b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 60fdc9fa88683b8280861ef97ce4da3627572e359e241165f2faac0ef9089028
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 16A1B5B1604300AFE760DF14C886F2AB7E6AF84714F14885DF5999B2D2D774EC41CB56
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 0071DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0071CF22,?), ref: 0071DDFD
                                                                                                                                                                                                                                                        • Part of subcall function 0071DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0071CF22,?), ref: 0071DE16
                                                                                                                                                                                                                                                        • Part of subcall function 0071E199: GetFileAttributesW.KERNEL32(?,0071CF95), ref: 0071E19A
                                                                                                                                                                                                                                                      • lstrcmpiW.KERNEL32(?,?), ref: 0071E473
                                                                                                                                                                                                                                                      • MoveFileW.KERNEL32(?,?), ref: 0071E4AC
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 0071E5EB
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 0071E603
                                                                                                                                                                                                                                                      • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 0071E650
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3183298772-0
                                                                                                                                                                                                                                                      • Opcode ID: 95c56fba731ef6871bcff1e073419c294a8f40766a6879a5cb28351a62c17744
                                                                                                                                                                                                                                                      • Instruction ID: 34c9c94c1972701465eec5848ed6b468489f8e433523ea0f8b6bc62672377e9b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 95c56fba731ef6871bcff1e073419c294a8f40766a6879a5cb28351a62c17744
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 545186B24083859BC764DB94DC819DF73EDAF85340F00491EFA89D3191EF78A6C8876A
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006B9CB3: _wcslen.LIBCMT ref: 006B9CBD
                                                                                                                                                                                                                                                        • Part of subcall function 0073C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0073B6AE,?,?), ref: 0073C9B5
                                                                                                                                                                                                                                                        • Part of subcall function 0073C998: _wcslen.LIBCMT ref: 0073C9F1
                                                                                                                                                                                                                                                        • Part of subcall function 0073C998: _wcslen.LIBCMT ref: 0073CA68
                                                                                                                                                                                                                                                        • Part of subcall function 0073C998: _wcslen.LIBCMT ref: 0073CA9E
                                                                                                                                                                                                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0073BAA5
                                                                                                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0073BB00
                                                                                                                                                                                                                                                      • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0073BB63
                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?), ref: 0073BBA6
                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 0073BBB3
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 826366716-0
                                                                                                                                                                                                                                                      • Opcode ID: 7bda5d526520b96624186cb0cdb0c64bb94103c94139fe4abcbe19865cfe4578
                                                                                                                                                                                                                                                      • Instruction ID: fdce111611c152a2fcf94fe7f52ed0dc201ab050b3855421713a6a11201d9f30
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7bda5d526520b96624186cb0cdb0c64bb94103c94139fe4abcbe19865cfe4578
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B361C471208241EFD314DF24C890E6ABBE5FF84308F14895DF5998B2A2DB35ED45CB92
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • VariantInit.OLEAUT32(?), ref: 00718BCD
                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32 ref: 00718C3E
                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32 ref: 00718C9D
                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00718D10
                                                                                                                                                                                                                                                      • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00718D3B
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Variant$Clear$ChangeInitType
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 4136290138-0
                                                                                                                                                                                                                                                      • Opcode ID: 57bde3719e8a9258cb7135ae8db2f88a568bfaafe5f744503963a7762feb2f67
                                                                                                                                                                                                                                                      • Instruction ID: eea85814399677317c95e00c4c85b77cfa12bfc72871267bea9635e6e22f0d3d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 57bde3719e8a9258cb7135ae8db2f88a568bfaafe5f744503963a7762feb2f67
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4B5169B5A00219EFCB10CF68D884AAABBF8FF8D310B158559E955DB350E734E911CFA0
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00728BAE
                                                                                                                                                                                                                                                      • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00728BDA
                                                                                                                                                                                                                                                      • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00728C32
                                                                                                                                                                                                                                                      • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00728C57
                                                                                                                                                                                                                                                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00728C5F
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: PrivateProfile$SectionWrite$String
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2832842796-0
                                                                                                                                                                                                                                                      • Opcode ID: bc60f934969bd3a5c2558362a8302466995c2711508b7f6059c9eacc5106a16a
                                                                                                                                                                                                                                                      • Instruction ID: 50d4e57368dc1d22b9da7e19b7c99ad0e0f2a5f2c0704202b0ea81a9a08ec641
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bc60f934969bd3a5c2558362a8302466995c2711508b7f6059c9eacc5106a16a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B6517175A002149FCB51DF54C881EADBBF6FF49314F048098E8096B362CB35ED81CBA5
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00738F40
                                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00738FD0
                                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00738FEC
                                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00739032
                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000), ref: 00739052
                                                                                                                                                                                                                                                        • Part of subcall function 006CF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00721043,?,753CE610), ref: 006CF6E6
                                                                                                                                                                                                                                                        • Part of subcall function 006CF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,0070FA64,00000000,00000000,?,?,00721043,?,753CE610,?,0070FA64), ref: 006CF70D
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 666041331-0
                                                                                                                                                                                                                                                      • Opcode ID: 6cdcbdab693a62ba77ee38a700940fde56f0da770c812dde0546f292c0bba06b
                                                                                                                                                                                                                                                      • Instruction ID: f369c249f6d906165d22d76751429005a844075a5f08b8c0bc40f044eec99cbb
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6cdcbdab693a62ba77ee38a700940fde56f0da770c812dde0546f292c0bba06b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A7517B75600206DFDB55DF58C4848ADBBF2FF49314F088099E90AAB362CB35ED85CB91
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00746C33
                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000EC,?), ref: 00746C4A
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00746C73
                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0072AB79,00000000,00000000), ref: 00746C98
                                                                                                                                                                                                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00746CC7
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$Long$MessageSendShow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3688381893-0
                                                                                                                                                                                                                                                      • Opcode ID: af5558983527de95431cac247b03bae3673afc70850da1c96301cbcae2d18a7f
                                                                                                                                                                                                                                                      • Instruction ID: f029e72f9c228fcbda1d6cddc7e8d0d6f6f7c2a8431eecd4299fa2acccf9f432
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: af5558983527de95431cac247b03bae3673afc70850da1c96301cbcae2d18a7f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1041F379A00104AFDB25CF68CC98FB97BA5EB0B350F154269F895A72E0C379FD41CA61
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: _free
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 269201875-0
                                                                                                                                                                                                                                                      • Opcode ID: 11bf19b88d5cbcc9833b1417cf3bfb46ed6f406dd6ebfb3a5b2551bce9344506
                                                                                                                                                                                                                                                      • Instruction ID: 1418232ffce5514f6fb0733d4a5365b5bf1cded4cfe807460adf29fd4fec6519
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 11bf19b88d5cbcc9833b1417cf3bfb46ed6f406dd6ebfb3a5b2551bce9344506
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3141E672A013019FCB24DF79C891A9EB3ABEF89314F15856DE615EB392D631ED01CB80
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 006C9141
                                                                                                                                                                                                                                                      • ScreenToClient.USER32(00000000,?), ref: 006C915E
                                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(00000001), ref: 006C9183
                                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(00000002), ref: 006C919D
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AsyncState$ClientCursorScreen
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 4210589936-0
                                                                                                                                                                                                                                                      • Opcode ID: c69600f1628f06f0842134b7082da4e0be130debec463e06ede6fce267daa19f
                                                                                                                                                                                                                                                      • Instruction ID: b16b1ad9e57b24cd739bc12ae2227933c69d554729f41a7b1ce4aed56f9e4f6b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c69600f1628f06f0842134b7082da4e0be130debec463e06ede6fce267daa19f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A7416031A0850AFBDF199F64C849BFEB7B5FB45324F248319E425A72D0C7346951CBA1
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetInputState.USER32 ref: 007238CB
                                                                                                                                                                                                                                                      • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00723922
                                                                                                                                                                                                                                                      • TranslateMessage.USER32(?), ref: 0072394B
                                                                                                                                                                                                                                                      • DispatchMessageW.USER32(?), ref: 00723955
                                                                                                                                                                                                                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00723966
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2256411358-0
                                                                                                                                                                                                                                                      • Opcode ID: b854396055c8f4627f605822a8b12c823431a24d6ec19dc6da56405aacea8823
                                                                                                                                                                                                                                                      • Instruction ID: e4edc1f8cc2265a2164d28dfc30c971355ceb92ee8ae11d322b0a5d8b81cf890
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b854396055c8f4627f605822a8b12c823431a24d6ec19dc6da56405aacea8823
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E531F7709443619FEB35CB34A809BB637A8EB06308F54456DE4A6C64A0E3BCB6C5CB25
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,0072C21E,00000000), ref: 0072CF38
                                                                                                                                                                                                                                                      • InternetReadFile.WININET(?,00000000,?,?), ref: 0072CF6F
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,00000000,?,?,?,0072C21E,00000000), ref: 0072CFB4
                                                                                                                                                                                                                                                      • SetEvent.KERNEL32(?,?,00000000,?,?,?,0072C21E,00000000), ref: 0072CFC8
                                                                                                                                                                                                                                                      • SetEvent.KERNEL32(?,?,00000000,?,?,?,0072C21E,00000000), ref: 0072CFF2
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3191363074-0
                                                                                                                                                                                                                                                      • Opcode ID: dbc6ab74f9980e034dc861e799112b613778ca2c0f0d7fbf7124ab15a99eb87b
                                                                                                                                                                                                                                                      • Instruction ID: 26b6400972e95e425312947ce96dbc63e99cacd88f345c3eac8bf90358700b57
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: dbc6ab74f9980e034dc861e799112b613778ca2c0f0d7fbf7124ab15a99eb87b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1C318272500615EFDB21DFA5D984EAFBBFAEF24350B10442EF516D2150D738AE40DB60
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00711915
                                                                                                                                                                                                                                                      • PostMessageW.USER32(00000001,00000201,00000001), ref: 007119C1
                                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,?,?), ref: 007119C9
                                                                                                                                                                                                                                                      • PostMessageW.USER32(00000001,00000202,00000000), ref: 007119DA
                                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,?,?,?), ref: 007119E2
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessagePostSleep$RectWindow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3382505437-0
                                                                                                                                                                                                                                                      • Opcode ID: f61a0b41804bb99035da28662ea3037ac0eab8e8e5440fe21de65d10e4db26a7
                                                                                                                                                                                                                                                      • Instruction ID: 146de3bcf6e11de3bae484fc07a66131f5d69665307c17621593a58e0062cb79
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f61a0b41804bb99035da28662ea3037ac0eab8e8e5440fe21de65d10e4db26a7
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3B31C275900259EFCB00CFACCD99ADE3BB5EB05315F108265FA21AB2D1C774AD84CB91
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00745745
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001074,?,00000001), ref: 0074579D
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 007457AF
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 007457BA
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00745816
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$_wcslen
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 763830540-0
                                                                                                                                                                                                                                                      • Opcode ID: 40d2c6316edf586c2053daf3db2a5e9dee3310292d08abb660fbb2868d0b05e4
                                                                                                                                                                                                                                                      • Instruction ID: d177e5430dc3ca13773a0dcec97d39288ee42fe04728f3a90084d18b846ccba0
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 40d2c6316edf586c2053daf3db2a5e9dee3310292d08abb660fbb2868d0b05e4
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2421A275904618DBDB219FA4CC85EEE7BB8FF05320F108266E929EA181D7789985CF50
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • IsWindow.USER32(00000000), ref: 00730951
                                                                                                                                                                                                                                                      • GetForegroundWindow.USER32 ref: 00730968
                                                                                                                                                                                                                                                      • GetDC.USER32(00000000), ref: 007309A4
                                                                                                                                                                                                                                                      • GetPixel.GDI32(00000000,?,00000003), ref: 007309B0
                                                                                                                                                                                                                                                      • ReleaseDC.USER32(00000000,00000003), ref: 007309E8
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$ForegroundPixelRelease
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 4156661090-0
                                                                                                                                                                                                                                                      • Opcode ID: 930c8c976e3a564360d3ee0836216de9a8551f9248e7fe5b0ec8e75b4c6ac381
                                                                                                                                                                                                                                                      • Instruction ID: 3bfb8f25cf43b3d62203eec0d2d5e7f838ae29df45f188558f4fde388b54181c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 930c8c976e3a564360d3ee0836216de9a8551f9248e7fe5b0ec8e75b4c6ac381
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5921CF79A00214AFD740EF64D888AAEBBE9FF45300F00C06DF84A97362CB34AD00CB90
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetEnvironmentStringsW.KERNEL32 ref: 006ECDC6
                                                                                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 006ECDE9
                                                                                                                                                                                                                                                        • Part of subcall function 006E3820: RtlAllocateHeap.NTDLL(00000000,?,00781444,?,006CFDF5,?,?,006BA976,00000010,00781440,006B13FC,?,006B13C6,?,006B1129), ref: 006E3852
                                                                                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 006ECE0F
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006ECE22
                                                                                                                                                                                                                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 006ECE31
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 336800556-0
                                                                                                                                                                                                                                                      • Opcode ID: 8c6cd9936f66ec0bde120209e38456b64ee7c1b43394ebe48f8301c32a66d371
                                                                                                                                                                                                                                                      • Instruction ID: 61717ae670554eeda2cb3afd77ca59f8da6a846f13c00a8e7d83b15018989a63
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8c6cd9936f66ec0bde120209e38456b64ee7c1b43394ebe48f8301c32a66d371
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1101D8726033957F63211A7B6C4CC7B696EDEC7BB1315412EF905D7201DB658D0381B4
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 006C9693
                                                                                                                                                                                                                                                      • SelectObject.GDI32(?,00000000), ref: 006C96A2
                                                                                                                                                                                                                                                      • BeginPath.GDI32(?), ref: 006C96B9
                                                                                                                                                                                                                                                      • SelectObject.GDI32(?,00000000), ref: 006C96E2
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ObjectSelect$BeginCreatePath
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3225163088-0
                                                                                                                                                                                                                                                      • Opcode ID: cee8103daf21ea5ba78b64f3382920c86b1263f059fe675848c316ab06972714
                                                                                                                                                                                                                                                      • Instruction ID: 5abb12ed551bc47c636b3c7c717fe0cd8ebaf5fdfaf619e07117c28f43fe06c5
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: cee8103daf21ea5ba78b64f3382920c86b1263f059fe675848c316ab06972714
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E3218670842345DBEB119F55DC08BF97BA9FB01315F60821AF410A62F0D3786852CBA8
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: _memcmp
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2931989736-0
                                                                                                                                                                                                                                                      • Opcode ID: 7ab7fd6ac08f8311b8180a37ef912e1ee214f58f98ce14496f9f7215d2a93393
                                                                                                                                                                                                                                                      • Instruction ID: 8449cfd6c21f9e1abce3d6d5fc49bd985ff044b7a3335d93eaba23aba1360567
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7ab7fd6ac08f8311b8180a37ef912e1ee214f58f98ce14496f9f7215d2a93393
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CF0192A5641A09FAE34C55289D93EFA635D9BA23A4B004025FD049E2C2FB68ED50C6B4
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,?,?,006DF2DE,006E3863,00781444,?,006CFDF5,?,?,006BA976,00000010,00781440,006B13FC,?,006B13C6), ref: 006E2DFD
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006E2E32
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006E2E59
                                                                                                                                                                                                                                                      • SetLastError.KERNEL32(00000000,006B1129), ref: 006E2E66
                                                                                                                                                                                                                                                      • SetLastError.KERNEL32(00000000,006B1129), ref: 006E2E6F
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorLast$_free
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3170660625-0
                                                                                                                                                                                                                                                      • Opcode ID: 1d70b2dd8f3d517de0a837957bfd1b65228d8348f294b7d943b3be453e13a82e
                                                                                                                                                                                                                                                      • Instruction ID: 6586cfb739f944503e944c21e08251335e7289e3b74ac31e305a3df2a1a37530
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1d70b2dd8f3d517de0a837957bfd1b65228d8348f294b7d943b3be453e13a82e
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B7017D362077A22BC61327372C9AD6B165FABC27B4B31802DF514A33D3EF388C010024
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0070FF41,80070057,?,?,?,0071035E), ref: 0071002B
                                                                                                                                                                                                                                                      • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0070FF41,80070057,?,?), ref: 00710046
                                                                                                                                                                                                                                                      • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0070FF41,80070057,?,?), ref: 00710054
                                                                                                                                                                                                                                                      • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0070FF41,80070057,?), ref: 00710064
                                                                                                                                                                                                                                                      • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0070FF41,80070057,?,?), ref: 00710070
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3897988419-0
                                                                                                                                                                                                                                                      • Opcode ID: 19905301b1774b15d9fe45af2b7e64b1174b39dc7291c8bbd8b608376ddef5cb
                                                                                                                                                                                                                                                      • Instruction ID: daa4922700da081a2c376ebf18a612f75c7639955f42ec95a7fdcf0d33ac50ad
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 19905301b1774b15d9fe45af2b7e64b1174b39dc7291c8bbd8b608376ddef5cb
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F601F27A601204BFDB114F68DC08BEA7AEDEF48791F108025F801D6250E7B9CEC09BA0
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 0071E997
                                                                                                                                                                                                                                                      • QueryPerformanceFrequency.KERNEL32(?), ref: 0071E9A5
                                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000), ref: 0071E9AD
                                                                                                                                                                                                                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 0071E9B7
                                                                                                                                                                                                                                                      • Sleep.KERNEL32 ref: 0071E9F3
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2833360925-0
                                                                                                                                                                                                                                                      • Opcode ID: 143bc5d39d05a8d653ac396f648e9996cfd8838744a9cf7ce91ef000f1cbc491
                                                                                                                                                                                                                                                      • Instruction ID: 600fcd511ee6ebba209128a65fbb3f897ac39916db85df2221ee962b51548863
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 143bc5d39d05a8d653ac396f648e9996cfd8838744a9cf7ce91ef000f1cbc491
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AC019275C0262DDBCF409FE8DC59AEDBB78FF09700F004546E902B2181DB38A590CB66
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00711114
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,00000000,00000000,?,?,00710B9B,?,?,?), ref: 00711120
                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00710B9B,?,?,?), ref: 0071112F
                                                                                                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00710B9B,?,?,?), ref: 00711136
                                                                                                                                                                                                                                                      • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0071114D
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 842720411-0
                                                                                                                                                                                                                                                      • Opcode ID: 88196fd20110dc9e2623c0e12b1a7fb40dac27268da075b454b110562a588779
                                                                                                                                                                                                                                                      • Instruction ID: dc60c20af520075b7f70f84f522f9503e0876a8cc801e32fb8d2ef64b59cbb2f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 88196fd20110dc9e2623c0e12b1a7fb40dac27268da075b454b110562a588779
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9F018179101209BFDB524FA9DC49EAA3F7EEF86364B104415FA41C7360DB35DC409A60
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00710FCA
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00710FD6
                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00710FE5
                                                                                                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00710FEC
                                                                                                                                                                                                                                                      • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00711002
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 44706859-0
                                                                                                                                                                                                                                                      • Opcode ID: 1950add31eb545ddf5690648a7c85584812d1c3a0e7aefa1b6453000ce3580e7
                                                                                                                                                                                                                                                      • Instruction ID: 6a1a292f268737eead7ea3168a0c3a6650539af3825653112b0eaccae3f2af4b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1950add31eb545ddf5690648a7c85584812d1c3a0e7aefa1b6453000ce3580e7
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B8F06279602305EBD7224FA8DC4DF963B6DEF8A761F508415FA45CB2A1CB78DC808A60
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0071102A
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00711036
                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00711045
                                                                                                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0071104C
                                                                                                                                                                                                                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00711062
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 44706859-0
                                                                                                                                                                                                                                                      • Opcode ID: 28cadfae3c7869eea97422727b76aa6205407dac61a238afbf7e11fa263dde9b
                                                                                                                                                                                                                                                      • Instruction ID: 0d60636101f707a201be14baef75bd60fc01652768132bd9bd3a1cf0b70c0e6a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 28cadfae3c7869eea97422727b76aa6205407dac61a238afbf7e11fa263dde9b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D5F06279702305EBD7225FA9EC49F963B6DEF8A761F504415FA45CB2A0CB78DC80CA60
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,0072017D,?,007232FC,?,00000001,006F2592,?), ref: 00720324
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,0072017D,?,007232FC,?,00000001,006F2592,?), ref: 00720331
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,0072017D,?,007232FC,?,00000001,006F2592,?), ref: 0072033E
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,0072017D,?,007232FC,?,00000001,006F2592,?), ref: 0072034B
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,0072017D,?,007232FC,?,00000001,006F2592,?), ref: 00720358
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,0072017D,?,007232FC,?,00000001,006F2592,?), ref: 00720365
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseHandle
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2962429428-0
                                                                                                                                                                                                                                                      • Opcode ID: fc4d67b944f13e37eba98d4776b4cb65bddb22baef91a4dd7b53d9e5f55feea4
                                                                                                                                                                                                                                                      • Instruction ID: 3216d62146024c36cf71d8388c072f9c0af064f793a0dc07d1f88799ef290f27
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: fc4d67b944f13e37eba98d4776b4cb65bddb22baef91a4dd7b53d9e5f55feea4
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C801A276801B259FC7309F66E880412FBF5BF503153158A3FD19652932C375A954CF90
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006ED752
                                                                                                                                                                                                                                                        • Part of subcall function 006E29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,006ED7D1,00000000,00000000,00000000,00000000,?,006ED7F8,00000000,00000007,00000000,?,006EDBF5,00000000), ref: 006E29DE
                                                                                                                                                                                                                                                        • Part of subcall function 006E29C8: GetLastError.KERNEL32(00000000,?,006ED7D1,00000000,00000000,00000000,00000000,?,006ED7F8,00000000,00000007,00000000,?,006EDBF5,00000000,00000000), ref: 006E29F0
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006ED764
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006ED776
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006ED788
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006ED79A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 776569668-0
                                                                                                                                                                                                                                                      • Opcode ID: 0eab6378d06155ee056a95a99dc7e5b5a872c6f91f09ad4d46bfd6a4a0e8bc80
                                                                                                                                                                                                                                                      • Instruction ID: 7d00012e23f468d33003e682f7ac95a09750732de11e7b11d001fd1e344cad33
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0eab6378d06155ee056a95a99dc7e5b5a872c6f91f09ad4d46bfd6a4a0e8bc80
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 40F068325023896B8A51EB57F9C2C5A77DFBB08750B95580DF048DB602C738FC804A68
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00715C58
                                                                                                                                                                                                                                                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 00715C6F
                                                                                                                                                                                                                                                      • MessageBeep.USER32(00000000), ref: 00715C87
                                                                                                                                                                                                                                                      • KillTimer.USER32(?,0000040A), ref: 00715CA3
                                                                                                                                                                                                                                                      • EndDialog.USER32(?,00000001), ref: 00715CBD
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3741023627-0
                                                                                                                                                                                                                                                      • Opcode ID: 8b4d214386fddcc5db06e3bdb86ac6aaa74b3d37d11042c2c3e096ad61480dda
                                                                                                                                                                                                                                                      • Instruction ID: c0f81cfe7222e5f446f93f1eac32034da0963b478625c07c7ce05d090b2ff016
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8b4d214386fddcc5db06e3bdb86ac6aaa74b3d37d11042c2c3e096ad61480dda
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B301D134501B05EBEB265F14DD4EFE677B8BB01B01F00555AB683A10E0DBF8AAC48BA5
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006E22BE
                                                                                                                                                                                                                                                        • Part of subcall function 006E29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,006ED7D1,00000000,00000000,00000000,00000000,?,006ED7F8,00000000,00000007,00000000,?,006EDBF5,00000000), ref: 006E29DE
                                                                                                                                                                                                                                                        • Part of subcall function 006E29C8: GetLastError.KERNEL32(00000000,?,006ED7D1,00000000,00000000,00000000,00000000,?,006ED7F8,00000000,00000007,00000000,?,006EDBF5,00000000,00000000), ref: 006E29F0
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006E22D0
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006E22E3
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006E22F4
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006E2305
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 776569668-0
                                                                                                                                                                                                                                                      • Opcode ID: 203f8f4f2bb9c9a1d6083e885d3abbcaa8be2c21165b1d3dd872dc7056410b46
                                                                                                                                                                                                                                                      • Instruction ID: c608cc1574bd7c620a93a307f65317f93dda7abc36fbb17c253a1d5d567c8dce
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 203f8f4f2bb9c9a1d6083e885d3abbcaa8be2c21165b1d3dd872dc7056410b46
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E1F090714823518B8663AF56BC128483B6FB718BA0751D10EF014CA272C73C05429BED
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • EndPath.GDI32(?), ref: 006C95D4
                                                                                                                                                                                                                                                      • StrokeAndFillPath.GDI32(?,?,007071F7,00000000,?,?,?), ref: 006C95F0
                                                                                                                                                                                                                                                      • SelectObject.GDI32(?,00000000), ref: 006C9603
                                                                                                                                                                                                                                                      • DeleteObject.GDI32 ref: 006C9616
                                                                                                                                                                                                                                                      • StrokePath.GDI32(?), ref: 006C9631
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2625713937-0
                                                                                                                                                                                                                                                      • Opcode ID: 49db9fd8592cbf4488e24f430a9837f0ef8713fece59c4d7e5cd23d80b2cc753
                                                                                                                                                                                                                                                      • Instruction ID: bfaa55aeda9cd8ada1cf096095e5dd6a8f19fa795cfc42ec2f3cb150b3642199
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 49db9fd8592cbf4488e24f430a9837f0ef8713fece59c4d7e5cd23d80b2cc753
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3DF03C34046688EBDB265F65ED1CBB43B6AEB01322F64C219F425551F0D7389992DF28
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: __freea$_free
                                                                                                                                                                                                                                                      • String ID: a/p$am/pm
                                                                                                                                                                                                                                                      • API String ID: 3432400110-3206640213
                                                                                                                                                                                                                                                      • Opcode ID: 5e3ee09c1e2c4ae9e087778401dc9b77175e025c60e08cc072a4d3611390395f
                                                                                                                                                                                                                                                      • Instruction ID: 60490a9cd96694e92abd422cedaaca7deec334833708f314e922b5c118027a07
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5e3ee09c1e2c4ae9e087778401dc9b77175e025c60e08cc072a4d3611390395f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 07D1E271902386CADB248F6AC855BFEB7B2EF07300F24011AEA019F794D7759D81EB91
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006D0242: EnterCriticalSection.KERNEL32(0078070C,00781884,?,?,006C198B,00782518,?,?,?,006B12F9,00000000), ref: 006D024D
                                                                                                                                                                                                                                                        • Part of subcall function 006D0242: LeaveCriticalSection.KERNEL32(0078070C,?,006C198B,00782518,?,?,?,006B12F9,00000000), ref: 006D028A
                                                                                                                                                                                                                                                        • Part of subcall function 006D00A3: __onexit.LIBCMT ref: 006D00A9
                                                                                                                                                                                                                                                      • __Init_thread_footer.LIBCMT ref: 00736238
                                                                                                                                                                                                                                                        • Part of subcall function 006D01F8: EnterCriticalSection.KERNEL32(0078070C,?,?,006C8747,00782514), ref: 006D0202
                                                                                                                                                                                                                                                        • Part of subcall function 006D01F8: LeaveCriticalSection.KERNEL32(0078070C,?,006C8747,00782514), ref: 006D0235
                                                                                                                                                                                                                                                        • Part of subcall function 0072359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 007235E4
                                                                                                                                                                                                                                                        • Part of subcall function 0072359C: LoadStringW.USER32(00782390,?,00000FFF,?), ref: 0072360A
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                                                                                                                                                                                                                                                      • String ID: x#x$x#x$x#x
                                                                                                                                                                                                                                                      • API String ID: 1072379062-3214113500
                                                                                                                                                                                                                                                      • Opcode ID: 7824ebc449e081691d5e57292943956e50480595d856d4b0bbf533eceae24f29
                                                                                                                                                                                                                                                      • Instruction ID: 4289fc5f6dfd03c1be4ca7999852ecf5d266e81119b21cc3953d7a295eec518c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7824ebc449e081691d5e57292943956e50480595d856d4b0bbf533eceae24f29
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AAC15D71A00109AFDB14DF98C891EBEB7BAFF48310F148069F9459B252DB78EA55CB90
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: JOk
                                                                                                                                                                                                                                                      • API String ID: 0-801978910
                                                                                                                                                                                                                                                      • Opcode ID: cb91a8bce686dd63c7334e4a4a4cdc721395bbc0ce37f45c34036ec8c654c65d
                                                                                                                                                                                                                                                      • Instruction ID: a0c6cb8fd43ac988df283908f407fc2f13401c827442588e82386f5b8f79c232
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: cb91a8bce686dd63c7334e4a4a4cdc721395bbc0ce37f45c34036ec8c654c65d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7351D171D027899BCB109FA6C855FEE7BBAAF05718F24005EF406A7292D6709A02CB65
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 006E8B6E
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 006E8B7A
                                                                                                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 006E8B81
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ByteCharErrorLastMultiWide__dosmaperr
                                                                                                                                                                                                                                                      • String ID: .m
                                                                                                                                                                                                                                                      • API String ID: 2434981716-2594521899
                                                                                                                                                                                                                                                      • Opcode ID: 304c928107f00c7b9fbe01e1bcd9659d709a4a78fb49ff1ec19c949920acc78d
                                                                                                                                                                                                                                                      • Instruction ID: d47a164335c27259c3e4dbefd035090107fa649332801ae30a13695d0c15c4cc
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 304c928107f00c7b9fbe01e1bcd9659d709a4a78fb49ff1ec19c949920acc78d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A24160705052C5AFD7259F59CC81ABD7F97DF85304B2881ADF44D8B252DE358D038794
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 0071B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,007121D0,?,?,00000034,00000800,?,00000034), ref: 0071B42D
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00712760
                                                                                                                                                                                                                                                        • Part of subcall function 0071B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,007121FF,?,?,00000800,?,00001073,00000000,?,?), ref: 0071B3F8
                                                                                                                                                                                                                                                        • Part of subcall function 0071B32A: GetWindowThreadProcessId.USER32(?,?), ref: 0071B355
                                                                                                                                                                                                                                                        • Part of subcall function 0071B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00712194,00000034,?,?,00001004,00000000,00000000), ref: 0071B365
                                                                                                                                                                                                                                                        • Part of subcall function 0071B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00712194,00000034,?,?,00001004,00000000,00000000), ref: 0071B37B
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 007127CD
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0071281A
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                                                                                                                                                                                      • String ID: @
                                                                                                                                                                                                                                                      • API String ID: 4150878124-2766056989
                                                                                                                                                                                                                                                      • Opcode ID: c7401fae535d300a0bac7e68152b8cd3431aa92053122b1dd795a4f3b59545da
                                                                                                                                                                                                                                                      • Instruction ID: 534e85acddbecfd2667a27e912dfde69311fe05919a7277dda5b4423c6c45759
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c7401fae535d300a0bac7e68152b8cd3431aa92053122b1dd795a4f3b59545da
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 16413076900218BFDB10DFA8CD85ADEBBB8EF05700F108095FA55B7181DB746E95CB61
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 006E1769
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006E1834
                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 006E183E
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: _free$FileModuleName
                                                                                                                                                                                                                                                      • String ID: C:\Users\user\Desktop\file.exe
                                                                                                                                                                                                                                                      • API String ID: 2506810119-1957095476
                                                                                                                                                                                                                                                      • Opcode ID: bfca84f33aefd765d4577b034cd0aaefd5dfe8eecdc4a24d086cc8243e2386c7
                                                                                                                                                                                                                                                      • Instruction ID: f10e67ab406912ba4da8eb8563b67721c6eb98d0cbab8b90f9e7cd72c102c66e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bfca84f33aefd765d4577b034cd0aaefd5dfe8eecdc4a24d086cc8243e2386c7
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9731C271A41398ABCB21DB9A9C85DDFBBFEEB86710B60416AF4009B311D6708E41DB94
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 0071C306
                                                                                                                                                                                                                                                      • DeleteMenu.USER32(?,00000007,00000000), ref: 0071C34C
                                                                                                                                                                                                                                                      • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00781990,019055E0), ref: 0071C395
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Menu$Delete$InfoItem
                                                                                                                                                                                                                                                      • String ID: 0
                                                                                                                                                                                                                                                      • API String ID: 135850232-4108050209
                                                                                                                                                                                                                                                      • Opcode ID: b3e1b81ea89f0be44579039acf3710fc825d7dc558ab33a1ecced60f75fa8d06
                                                                                                                                                                                                                                                      • Instruction ID: aa9b7e7bc657f84cb830930eacd07b2fc2022f0de589bd830935373821cf8874
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b3e1b81ea89f0be44579039acf3710fc825d7dc558ab33a1ecced60f75fa8d06
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4241E231244301DFD721DF68D885B9ABBE4AF85320F108A1EF9A5972D1C738E984CB67
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0074CC08,00000000,?,?,?,?), ref: 007444AA
                                                                                                                                                                                                                                                      • GetWindowLongW.USER32 ref: 007444C7
                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 007444D7
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$Long
                                                                                                                                                                                                                                                      • String ID: SysTreeView32
                                                                                                                                                                                                                                                      • API String ID: 847901565-1698111956
                                                                                                                                                                                                                                                      • Opcode ID: 8b99419717ab23b34a207bf56ed282339fd7e64d3120e610145b56d45da6e6c2
                                                                                                                                                                                                                                                      • Instruction ID: 8c4c6e44e5fbbc696c6d1d633ef1e6db894e5e2d13797af2b542ed1ae281e53e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8b99419717ab23b34a207bf56ed282339fd7e64d3120e610145b56d45da6e6c2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0C31BE72200245AFDF618E78DC45FEA77A9EB09334F208319F979921D0D778EC60AB50
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SysReAllocString.OLEAUT32(?,?), ref: 00716EED
                                                                                                                                                                                                                                                      • VariantCopyInd.OLEAUT32(?,?), ref: 00716F08
                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00716F12
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Variant$AllocClearCopyString
                                                                                                                                                                                                                                                      • String ID: *jq
                                                                                                                                                                                                                                                      • API String ID: 2173805711-1921767587
                                                                                                                                                                                                                                                      • Opcode ID: 8d8c5211bf22b9e38feef07aa165fa31f634922f7df9aad3574e7342ab4f149d
                                                                                                                                                                                                                                                      • Instruction ID: b340db38ce179194b3a28e26ed2143aa41be3b549c7a64f1e136e01839a0a0af
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8d8c5211bf22b9e38feef07aa165fa31f634922f7df9aad3574e7342ab4f149d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9031A172604245DBCB05AFA8E8529FD37BEEF85700B100499F9025B2F1C7789992DB94
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 0073335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00733077,?,?), ref: 00733378
                                                                                                                                                                                                                                                      • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0073307A
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 0073309B
                                                                                                                                                                                                                                                      • htons.WSOCK32(00000000,?,?,00000000), ref: 00733106
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                                                                                                                                                                                                      • String ID: 255.255.255.255
                                                                                                                                                                                                                                                      • API String ID: 946324512-2422070025
                                                                                                                                                                                                                                                      • Opcode ID: 17a3136dcf953db5d0a98e890d711607c477ac0d4b7a3e8fe61a06e02626f3b4
                                                                                                                                                                                                                                                      • Instruction ID: f7e323d8443e2af24623a64867d1a7c8109c07abac30362da3bd50c22ccc4355
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 17a3136dcf953db5d0a98e890d711607c477ac0d4b7a3e8fe61a06e02626f3b4
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3E31C139604205DFEB24CF28C585EAA77E1EF14318F248059E9158F3A3DB3AEE81C760
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00743F40
                                                                                                                                                                                                                                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00743F54
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00743F78
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$Window
                                                                                                                                                                                                                                                      • String ID: SysMonthCal32
                                                                                                                                                                                                                                                      • API String ID: 2326795674-1439706946
                                                                                                                                                                                                                                                      • Opcode ID: fea11accfe1acec790519ae0fb311e205f6632aeac7df5e946f7c50efc9a0ed1
                                                                                                                                                                                                                                                      • Instruction ID: 1753b34d5a273b28fbb0ebdcf1b2eb23681c52a03f85428d67a05972c937d9ff
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: fea11accfe1acec790519ae0fb311e205f6632aeac7df5e946f7c50efc9a0ed1
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0A21BF32600219BBDF158F50CC46FEA3B79EF49724F114215FE196B1D0D7B9A954CB90
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00744705
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00744713
                                                                                                                                                                                                                                                      • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0074471A
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$DestroyWindow
                                                                                                                                                                                                                                                      • String ID: msctls_updown32
                                                                                                                                                                                                                                                      • API String ID: 4014797782-2298589950
                                                                                                                                                                                                                                                      • Opcode ID: 10ab6b57e4dd9fc64f890a984dfc1e0e050f7c8c34955f30c2e79bf2f0c17f06
                                                                                                                                                                                                                                                      • Instruction ID: d7ae60587c7a2201a83ff6084ba10886b9ca865f3084b7d6fdc9bd3595b2cfcc
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 10ab6b57e4dd9fc64f890a984dfc1e0e050f7c8c34955f30c2e79bf2f0c17f06
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: EC218CB5600209AFDB11DF64DC81DAB37ADEB4A3A4B114059FA009B351CB38EC12DB64
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: _wcslen
                                                                                                                                                                                                                                                      • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                                                                                                                                                                                                      • API String ID: 176396367-2734436370
                                                                                                                                                                                                                                                      • Opcode ID: 1098c37c23a2a9efbf329faffd3c08c173adf2d8448b7034b29366a932781739
                                                                                                                                                                                                                                                      • Instruction ID: b702578dba601e1ba0d344d3e8bddf4be6fb1850f91e4f3ac137082d96dfdb98
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1098c37c23a2a9efbf329faffd3c08c173adf2d8448b7034b29366a932781739
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4721297250411066D331AB2D9822FF773EA9F91300F10402AFA49971C1EB59ADD2C2A9
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00743840
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00743850
                                                                                                                                                                                                                                                      • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00743876
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend$MoveWindow
                                                                                                                                                                                                                                                      • String ID: Listbox
                                                                                                                                                                                                                                                      • API String ID: 3315199576-2633736733
                                                                                                                                                                                                                                                      • Opcode ID: 94b3641b0238720c41aadf58e2e40f02ae452c95619e81a307e9da12a1494474
                                                                                                                                                                                                                                                      • Instruction ID: 8e91ba7258e291882d8d72a5ecf32b47f03c66e0c64fd14290aee346416d779c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 94b3641b0238720c41aadf58e2e40f02ae452c95619e81a307e9da12a1494474
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0C21D172600218BBEF228F54CC85FBB3B6EEF89760F118125F9489B190C779DC5287A0
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000001), ref: 00724A08
                                                                                                                                                                                                                                                      • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00724A5C
                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000000,?,?,0074CC08), ref: 00724AD0
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorMode$InformationVolume
                                                                                                                                                                                                                                                      • String ID: %lu
                                                                                                                                                                                                                                                      • API String ID: 2507767853-685833217
                                                                                                                                                                                                                                                      • Opcode ID: 2aee49619c00e33f27df7126ed989fa1897fb5413e9d4e541afbfc56d074eae3
                                                                                                                                                                                                                                                      • Instruction ID: 696ccb0f929f39dc36f162792bd61c3d66d6d210becd685f919173ba0673d5f3
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2aee49619c00e33f27df7126ed989fa1897fb5413e9d4e541afbfc56d074eae3
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9731C1B5A00108AFDB50DF64C885EAA7BF9EF08308F1480A9F908DB352D775ED41CB61
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0074424F
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00744264
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00744271
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                                                                                                      • String ID: msctls_trackbar32
                                                                                                                                                                                                                                                      • API String ID: 3850602802-1010561917
                                                                                                                                                                                                                                                      • Opcode ID: bf7e2607f26d633b2ba614e40eee909ab259b5d9ff89febb91947dd8bf8c82c5
                                                                                                                                                                                                                                                      • Instruction ID: e26b6d41882e42cfe5f318a48efc739807fff24cef0556f24760f04ea8f0b37b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bf7e2607f26d633b2ba614e40eee909ab259b5d9ff89febb91947dd8bf8c82c5
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3C110671240208BEEF205F29CC06FAB3BACFF95B64F114524FA55E2090D7B5DC519B14
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006B6B57: _wcslen.LIBCMT ref: 006B6B6A
                                                                                                                                                                                                                                                        • Part of subcall function 00712DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00712DC5
                                                                                                                                                                                                                                                        • Part of subcall function 00712DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00712DD6
                                                                                                                                                                                                                                                        • Part of subcall function 00712DA7: GetCurrentThreadId.KERNEL32 ref: 00712DDD
                                                                                                                                                                                                                                                        • Part of subcall function 00712DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00712DE4
                                                                                                                                                                                                                                                      • GetFocus.USER32 ref: 00712F78
                                                                                                                                                                                                                                                        • Part of subcall function 00712DEE: GetParent.USER32(00000000), ref: 00712DF9
                                                                                                                                                                                                                                                      • GetClassNameW.USER32(?,?,00000100), ref: 00712FC3
                                                                                                                                                                                                                                                      • EnumChildWindows.USER32(?,0071303B), ref: 00712FEB
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                                                                                                                                                                                                      • String ID: %s%d
                                                                                                                                                                                                                                                      • API String ID: 1272988791-1110647743
                                                                                                                                                                                                                                                      • Opcode ID: 3a9e89e6483764b3abc922ce607a5f1304b62fb0e24247ba59a55de37d2e3b54
                                                                                                                                                                                                                                                      • Instruction ID: e8d0581fdff05cd03fb254b014fd7512ce1d38adc9197a07e314dd4907359aa6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3a9e89e6483764b3abc922ce607a5f1304b62fb0e24247ba59a55de37d2e3b54
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CA11D5B5300205ABDF857F64DC99EED37AAAF84304F048079B9099B292DF3859858B70
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 007458C1
                                                                                                                                                                                                                                                      • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 007458EE
                                                                                                                                                                                                                                                      • DrawMenuBar.USER32(?), ref: 007458FD
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Menu$InfoItem$Draw
                                                                                                                                                                                                                                                      • String ID: 0
                                                                                                                                                                                                                                                      • API String ID: 3227129158-4108050209
                                                                                                                                                                                                                                                      • Opcode ID: 33db88299158b557a967e0e245e414746dae0428f60e3f3adfefa19441b0a66d
                                                                                                                                                                                                                                                      • Instruction ID: 2547adafbf1726b6c6eba43c3f40ed4e1f306b8be6a5991af17500add2d9aa8d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 33db88299158b557a967e0e245e414746dae0428f60e3f3adfefa19441b0a66d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9F01C031500208EFDB619F11DC44FAEBBB5FF46760F10C09AE849DA152DB349A90EF20
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: b752b50b017e3a0e2a184fa1e00ed819e668726723ac9cfad971a4d988cc09be
                                                                                                                                                                                                                                                      • Instruction ID: 81d00949685df9441dc0e54262558d9011adfa164f8d1a14b06f7d7710e922a8
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b752b50b017e3a0e2a184fa1e00ed819e668726723ac9cfad971a4d988cc09be
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A4C18C75A0020AEFCB14CFA8C888AAEB7B5FF48714F108598E415EB291D774EDC1DB90
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Variant$ClearInitInitializeUninitialize
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1998397398-0
                                                                                                                                                                                                                                                      • Opcode ID: ec743a926b80e576661b9a5bb641850f7a2fa9a5bd9868d0f025756f2880c149
                                                                                                                                                                                                                                                      • Instruction ID: 129b5de739fd80ff508cdbd9b8acb868da78a2c329b9d1eb8a286c795d5aa1af
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ec743a926b80e576661b9a5bb641850f7a2fa9a5bd9868d0f025756f2880c149
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FBA15BB5604210DFD760DF28C486A6AB7E5FF88314F04885DF98A9B362DB34EE41CB95
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,0074FC08,?), ref: 007105F0
                                                                                                                                                                                                                                                      • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,0074FC08,?), ref: 00710608
                                                                                                                                                                                                                                                      • CLSIDFromProgID.OLE32(?,?,00000000,0074CC40,000000FF,?,00000000,00000800,00000000,?,0074FC08,?), ref: 0071062D
                                                                                                                                                                                                                                                      • _memcmp.LIBVCRUNTIME ref: 0071064E
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FromProg$FreeTask_memcmp
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 314563124-0
                                                                                                                                                                                                                                                      • Opcode ID: 3eb3246d3936722bed6fa1dfc5bd3cfc82162530f82de7b27b24f5b77b1f3f17
                                                                                                                                                                                                                                                      • Instruction ID: abdfbac37840139190eec42ca55ce93543da78805adc6c73325e6a200e9dfe76
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3eb3246d3936722bed6fa1dfc5bd3cfc82162530f82de7b27b24f5b77b1f3f17
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 97810F75900109EFCB04DF98C984DEEB7BAFF89315F104558F506AB250DB75AE86CBA0
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 0073A6AC
                                                                                                                                                                                                                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 0073A6BA
                                                                                                                                                                                                                                                        • Part of subcall function 006B9CB3: _wcslen.LIBCMT ref: 006B9CBD
                                                                                                                                                                                                                                                      • Process32NextW.KERNEL32(00000000,?), ref: 0073A79C
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 0073A7AB
                                                                                                                                                                                                                                                        • Part of subcall function 006CCE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,006F3303,?), ref: 006CCE8A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1991900642-0
                                                                                                                                                                                                                                                      • Opcode ID: 497727c7fb52a0e85ccdc4cd6d2d6ed84e8ab9da81f99460357342b76ba2d68f
                                                                                                                                                                                                                                                      • Instruction ID: 33d73578f7359392650b351d5ddf2f4066cff284323d7e7e8189078c055d26cd
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 497727c7fb52a0e85ccdc4cd6d2d6ed84e8ab9da81f99460357342b76ba2d68f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F2517FB1508300AFD350EF24C886EABBBE9FF89754F00891DF58597252EB34D944CB96
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: _free
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 269201875-0
                                                                                                                                                                                                                                                      • Opcode ID: e8e6d340d334a79b75da288c0e12a3c2810189472953ee057dd43daefc10cf97
                                                                                                                                                                                                                                                      • Instruction ID: f4bc31c672a6ab6846cb1e612b373928e454c88f3ee69140acdb871c24d00b47
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e8e6d340d334a79b75da288c0e12a3c2810189472953ee057dd43daefc10cf97
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 14412B31900208EBDB616FF99C456FE3AE7EF833B0F14422AF619DA392E634494153B5
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 007462E2
                                                                                                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 00746315
                                                                                                                                                                                                                                                      • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00746382
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$ClientMoveRectScreen
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3880355969-0
                                                                                                                                                                                                                                                      • Opcode ID: bf038644edd80aa3db6e7338185a218fcea31a6ef756565b1d7cd3b970bd6010
                                                                                                                                                                                                                                                      • Instruction ID: 6149236404ab7314e087c9285a1514277164f6fd6d5fa0d3cad1518a5750d795
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bf038644edd80aa3db6e7338185a218fcea31a6ef756565b1d7cd3b970bd6010
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6A516074A00249EFCF14DF68D8809AE7BB6FF46364F208259F9259B290D734ED81CB51
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • socket.WSOCK32(00000002,00000002,00000011), ref: 00731AFD
                                                                                                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 00731B0B
                                                                                                                                                                                                                                                      • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00731B8A
                                                                                                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 00731B94
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorLast$socket
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1881357543-0
                                                                                                                                                                                                                                                      • Opcode ID: 65c576d2b128ae67fcd7775266cb86aeab97adff9a69b1091d697be3639285d6
                                                                                                                                                                                                                                                      • Instruction ID: 2d091fcfcc2d5a4b332d65fa40eb10077d93c508747b6baff0d6ea664fec6e50
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 65c576d2b128ae67fcd7775266cb86aeab97adff9a69b1091d697be3639285d6
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6541B0B4600200AFE760AF24C886F6677E6AB44718F54C48CF91A9F6D3D776DD818B94
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 546b472cc0b81a86fda5eca5905d79a25835cf40d675f2cdb5721ba978570bbc
                                                                                                                                                                                                                                                      • Instruction ID: cf8b047d6823d46f8d3c661af7685f25d4e4d434bc6b8b69240f3333d3acf0be
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 546b472cc0b81a86fda5eca5905d79a25835cf40d675f2cdb5721ba978570bbc
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D941D3B1A01384EFD7249F79CC41BABBBEAEB88710F10552EF542DB2C2D771A9018784
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00725783
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,00000000), ref: 007257A9
                                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 007257CE
                                                                                                                                                                                                                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 007257FA
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3321077145-0
                                                                                                                                                                                                                                                      • Opcode ID: 1ba6f1b87425402b3dce9d5d9740ddceb37f284dc6289fbe674d75200d41ddcb
                                                                                                                                                                                                                                                      • Instruction ID: 8e02f0be2b3aa021c9f74e9c1517fe23fbf6e358a9340803ee850b314bef38c7
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1ba6f1b87425402b3dce9d5d9740ddceb37f284dc6289fbe674d75200d41ddcb
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C941417A600620DFCB21DF15C445A5DBBF2EF89320B18C488E84A5B362CB74FD40CB95
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000000,?,006D6D71,00000000,00000000,006D82D9,?,006D82D9,?,00000001,006D6D71,?,00000001,006D82D9,006D82D9), ref: 006ED910
                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 006ED999
                                                                                                                                                                                                                                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 006ED9AB
                                                                                                                                                                                                                                                      • __freea.LIBCMT ref: 006ED9B4
                                                                                                                                                                                                                                                        • Part of subcall function 006E3820: RtlAllocateHeap.NTDLL(00000000,?,00781444,?,006CFDF5,?,?,006BA976,00000010,00781440,006B13FC,?,006B13C6,?,006B1129), ref: 006E3852
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2652629310-0
                                                                                                                                                                                                                                                      • Opcode ID: ac012b9371c86bbcb9a5bca7d1aa1e5719d61118d6c28ae868567c9975ad3911
                                                                                                                                                                                                                                                      • Instruction ID: b873375fe744805186e9619e4d69bfdb8ec40c57dd9b684463763812c7ae87a2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ac012b9371c86bbcb9a5bca7d1aa1e5719d61118d6c28ae868567c9975ad3911
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1931DC72A0124AABDF258F66DC45EEE7BA6EB41310F054169FC04DB292EB35CD50CBA4
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 00745352
                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00745375
                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00745382
                                                                                                                                                                                                                                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 007453A8
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: LongWindow$InvalidateMessageRectSend
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3340791633-0
                                                                                                                                                                                                                                                      • Opcode ID: f40cf645c33d41ba1581fbf7be196176bfc9951d2abd7e9b5114cf0796c511d1
                                                                                                                                                                                                                                                      • Instruction ID: 3d724506e8c251019aace64e09d1736763856f21ceec0bce6a7633ff4ab9d6fd
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f40cf645c33d41ba1581fbf7be196176bfc9951d2abd7e9b5114cf0796c511d1
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2831D634A55A0CEFEF319F14CC05FE87765AB05398F588142FA10961E2C7BC9D40DB46
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 0071ABF1
                                                                                                                                                                                                                                                      • SetKeyboardState.USER32(00000080,?,00008000), ref: 0071AC0D
                                                                                                                                                                                                                                                      • PostMessageW.USER32(00000000,00000101,00000000), ref: 0071AC74
                                                                                                                                                                                                                                                      • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 0071ACC6
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: KeyboardState$InputMessagePostSend
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 432972143-0
                                                                                                                                                                                                                                                      • Opcode ID: 6943d20ecf0fb9c2ce392110040d60a395d06287df58b087a0bfe0c1d2ae0d66
                                                                                                                                                                                                                                                      • Instruction ID: eebafb818d2774281ab701e09f3938dd157f085f329c649e677268fe508a91f0
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6943d20ecf0fb9c2ce392110040d60a395d06287df58b087a0bfe0c1d2ae0d66
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9D31F630A01618BFEB35CF6D88097FA7BA6AB85310F04821AE485921D1D37D89C587F2
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • ClientToScreen.USER32(?,?), ref: 0074769A
                                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00747710
                                                                                                                                                                                                                                                      • PtInRect.USER32(?,?,00748B89), ref: 00747720
                                                                                                                                                                                                                                                      • MessageBeep.USER32(00000000), ref: 0074778C
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Rect$BeepClientMessageScreenWindow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1352109105-0
                                                                                                                                                                                                                                                      • Opcode ID: ca74b375d1e730e17b435c297cdd9a53460a21ab328632b0ca90b8447d3aad41
                                                                                                                                                                                                                                                      • Instruction ID: 137e0a6b50cc383767835fecb26ff5b3c013521b24652f090812da5bd9c65fcd
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ca74b375d1e730e17b435c297cdd9a53460a21ab328632b0ca90b8447d3aad41
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7B41C338605254DFCB16CF58C894EA9B7F9FF49314F9680A9E514DB261C738E942CF90
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetForegroundWindow.USER32 ref: 007416EB
                                                                                                                                                                                                                                                        • Part of subcall function 00713A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00713A57
                                                                                                                                                                                                                                                        • Part of subcall function 00713A3D: GetCurrentThreadId.KERNEL32 ref: 00713A5E
                                                                                                                                                                                                                                                        • Part of subcall function 00713A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,007125B3), ref: 00713A65
                                                                                                                                                                                                                                                      • GetCaretPos.USER32(?), ref: 007416FF
                                                                                                                                                                                                                                                      • ClientToScreen.USER32(00000000,?), ref: 0074174C
                                                                                                                                                                                                                                                      • GetForegroundWindow.USER32 ref: 00741752
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2759813231-0
                                                                                                                                                                                                                                                      • Opcode ID: c3637cd8d654135c96d538f952cb8365c0e06e3bf6ce255d001a52dcde21b16b
                                                                                                                                                                                                                                                      • Instruction ID: bc9d1959dd1b2a7988beea6c13a69ea385e111479bdba65a608aa548d75b31e5
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c3637cd8d654135c96d538f952cb8365c0e06e3bf6ce255d001a52dcde21b16b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F93130B5D00149AFC741EFA9C885CEEBBFDEF88304B5480AAE415E7211D7359E85CBA4
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 006C9BB2
                                                                                                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00749001
                                                                                                                                                                                                                                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00707711,?,?,?,?,?), ref: 00749016
                                                                                                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 0074905E
                                                                                                                                                                                                                                                      • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00707711,?,?,?), ref: 00749094
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2864067406-0
                                                                                                                                                                                                                                                      • Opcode ID: 019e61ac31ef7140a2f48840edb8988cd17e27f6b45cc7dc04d039dfc03d40b6
                                                                                                                                                                                                                                                      • Instruction ID: ccef8f06b41f2d749668158fb65b509b62200eb45ddfdd76ca8004d1baa90304
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 019e61ac31ef7140a2f48840edb8988cd17e27f6b45cc7dc04d039dfc03d40b6
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9B219F35601018EFDB26CF94C859EFBBBB9EB4A350F148069FA0547271C739AD51DB60
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(?,0074CB68), ref: 0071D2FB
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 0071D30A
                                                                                                                                                                                                                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 0071D319
                                                                                                                                                                                                                                                      • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0074CB68), ref: 0071D376
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CreateDirectory$AttributesErrorFileLast
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2267087916-0
                                                                                                                                                                                                                                                      • Opcode ID: 5e20cfd47c9976e828b1b7b6ec26bed078011a01aa712280225dab9898886cd7
                                                                                                                                                                                                                                                      • Instruction ID: 89062262b3ad29e06d83a796968747cbe02fb0ab06ac4f0be18c8e12d209292c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5e20cfd47c9976e828b1b7b6ec26bed078011a01aa712280225dab9898886cd7
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5F2180B4505201DF8764DF28C8814AA77E4EE56324F104A1DF4A9C32E1DB34DD86CF97
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 00711014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0071102A
                                                                                                                                                                                                                                                        • Part of subcall function 00711014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00711036
                                                                                                                                                                                                                                                        • Part of subcall function 00711014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00711045
                                                                                                                                                                                                                                                        • Part of subcall function 00711014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0071104C
                                                                                                                                                                                                                                                        • Part of subcall function 00711014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00711062
                                                                                                                                                                                                                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 007115BE
                                                                                                                                                                                                                                                      • _memcmp.LIBVCRUNTIME ref: 007115E1
                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00711617
                                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 0071161E
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1592001646-0
                                                                                                                                                                                                                                                      • Opcode ID: bbe472b05b811e4e265cbaf54685f00a63ea24b2ba623a13e7f655c5cbe32a81
                                                                                                                                                                                                                                                      • Instruction ID: 4f7f97e203bdc07641ac53929e50ba941eeb10db0e0555185068b6c3cc74ec68
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bbe472b05b811e4e265cbaf54685f00a63ea24b2ba623a13e7f655c5cbe32a81
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3721B371E01108EFDF00DFA8C945BEEB7B9EF85344F498459E541AB281EB39AE45CB50
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000EC), ref: 0074280A
                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00742824
                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00742832
                                                                                                                                                                                                                                                      • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00742840
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$Long$AttributesLayered
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2169480361-0
                                                                                                                                                                                                                                                      • Opcode ID: 6198f342da4ae1aac16152ef8708afd7dc622b36e0672b6129e809373944d226
                                                                                                                                                                                                                                                      • Instruction ID: 1f244d6595fe565200463da1b1a253b707a1871001b69b36a80307bffc9d0c62
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6198f342da4ae1aac16152ef8708afd7dc622b36e0672b6129e809373944d226
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FF210635305110AFD7159B24C844FAA7799AF45324F148158F8268B2D3CB79FC92CB90
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 00718D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,0071790A,?,000000FF,?,00718754,00000000,?,0000001C,?,?), ref: 00718D8C
                                                                                                                                                                                                                                                        • Part of subcall function 00718D7D: lstrcpyW.KERNEL32(00000000,?,?,0071790A,?,000000FF,?,00718754,00000000,?,0000001C,?,?,00000000), ref: 00718DB2
                                                                                                                                                                                                                                                        • Part of subcall function 00718D7D: lstrcmpiW.KERNEL32(00000000,?,0071790A,?,000000FF,?,00718754,00000000,?,0000001C,?,?), ref: 00718DE3
                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00718754,00000000,?,0000001C,?,?,00000000), ref: 00717923
                                                                                                                                                                                                                                                      • lstrcpyW.KERNEL32(00000000,?,?,00718754,00000000,?,0000001C,?,?,00000000), ref: 00717949
                                                                                                                                                                                                                                                      • lstrcmpiW.KERNEL32(00000002,cdecl,?,00718754,00000000,?,0000001C,?,?,00000000), ref: 00717984
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: lstrcmpilstrcpylstrlen
                                                                                                                                                                                                                                                      • String ID: cdecl
                                                                                                                                                                                                                                                      • API String ID: 4031866154-3896280584
                                                                                                                                                                                                                                                      • Opcode ID: 590b497b647293d51d19c2767a1f4f8f13dba04167e87087b868e406e099da64
                                                                                                                                                                                                                                                      • Instruction ID: 203976b40e13309cf51cd29dc40ce24424e558d600cc429ea1ef1a8a3882281f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 590b497b647293d51d19c2767a1f4f8f13dba04167e87087b868e406e099da64
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A511063A200301ABCB159F38D844EBA77B9FF89750B10802AF946C72A4EB359841C795
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00747D0B
                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00747D2A
                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00747D42
                                                                                                                                                                                                                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0072B7AD,00000000), ref: 00747D6B
                                                                                                                                                                                                                                                        • Part of subcall function 006C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 006C9BB2
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$Long
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 847901565-0
                                                                                                                                                                                                                                                      • Opcode ID: 1e1287278b7f5d9496a9de637806f8c6aaa0a2a83fe687d24078a54420fae026
                                                                                                                                                                                                                                                      • Instruction ID: d8db3d736af625779ecfc794c2ab162562ec9d666ff5775acbe25d6a8e08f415
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1e1287278b7f5d9496a9de637806f8c6aaa0a2a83fe687d24078a54420fae026
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FD11D231615614AFCB149F28CC04A7A3BA9AF46360B218324F839CB2F0E7389D11CB54
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001060,?,00000004), ref: 007456BB
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 007456CD
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 007456D8
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00745816
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend_wcslen
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 455545452-0
                                                                                                                                                                                                                                                      • Opcode ID: e6607cf6ac0a7d48916fbb4004351ec20a472a3da09a5a1e1c637e1889158c8a
                                                                                                                                                                                                                                                      • Instruction ID: d485d98f0e08ac46c972f89dbb29b74feb4613a45fb0805ddbe7fd7c80ef3095
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e6607cf6ac0a7d48916fbb4004351ec20a472a3da09a5a1e1c637e1889158c8a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 96110675A00604A7DB209F75CC85EEE376CEF12760B50806AF905DA082EB78D980CB65
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 43130814d0719f008764897e67b5860bfaf62e0b47fd100f186425e89e38dba7
                                                                                                                                                                                                                                                      • Instruction ID: 24d921619d7b78807425ae47d7d32d3389c1b8601d8de59f38f93a6ed0d94bc1
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 43130814d0719f008764897e67b5860bfaf62e0b47fd100f186425e89e38dba7
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8A01F2B220B78A3EF651167A6CC1FA7261FDF827B8B34032AF520592D2DB748C006174
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00711A47
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00711A59
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00711A6F
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00711A8A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3850602802-0
                                                                                                                                                                                                                                                      • Opcode ID: 3f6adfe94d57c15eaebe163b2377241aaac9bc9e4d0d11272fc9909a0dc2cbe8
                                                                                                                                                                                                                                                      • Instruction ID: e431778e5264896f6fe0655e331e8db2cddcc12e74f53c35bcd86dde834ba082
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3f6adfe94d57c15eaebe163b2377241aaac9bc9e4d0d11272fc9909a0dc2cbe8
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0711FA3A901219FFEB119BA9CD85FEDBB78EF04750F604091EA04B7290D6716E50DB94
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 0071E1FD
                                                                                                                                                                                                                                                      • MessageBoxW.USER32(?,?,?,?), ref: 0071E230
                                                                                                                                                                                                                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0071E246
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0071E24D
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2880819207-0
                                                                                                                                                                                                                                                      • Opcode ID: daf4cad46e0c990c743de76a40371eeee5629c806c0c997f27eb281698e1fc74
                                                                                                                                                                                                                                                      • Instruction ID: f07a3c3ceb2a8f62c6af499a998ba28ca2eb24cd50e4d425e8c32e1c29507fdc
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: daf4cad46e0c990c743de76a40371eeee5629c806c0c997f27eb281698e1fc74
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 86112B76E04258BBC7019FAC9C05ADE7FACAB46310F108216FD14D32D1D3B8CD0087A4
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CreateThread.KERNEL32(00000000,?,006DCFF9,00000000,00000004,00000000), ref: 006DD218
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 006DD224
                                                                                                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 006DD22B
                                                                                                                                                                                                                                                      • ResumeThread.KERNEL32(00000000), ref: 006DD249
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 173952441-0
                                                                                                                                                                                                                                                      • Opcode ID: 4c140bf5899cdf3d2c581232ae72df78ed9f600ea93ad37163187d5fc20fc403
                                                                                                                                                                                                                                                      • Instruction ID: 458c7c6bb6cf5dad3f7421826242a1c8a1cf602598773004ba95cdda727292bc
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4c140bf5899cdf3d2c581232ae72df78ed9f600ea93ad37163187d5fc20fc403
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DC01D636C052087BCB516FA5DC05BEA7A6FDF82330F10421FF925923D0CB718A01C6A5
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 006C9BB2
                                                                                                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 00749F31
                                                                                                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00749F3B
                                                                                                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 00749F46
                                                                                                                                                                                                                                                      • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00749F7A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Client$CursorLongProcRectScreenWindow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 4127811313-0
                                                                                                                                                                                                                                                      • Opcode ID: c681c1ffb8ec80a3691706ed05bd123775342b9a3d65fcbeef8ec5aa4a08b0a2
                                                                                                                                                                                                                                                      • Instruction ID: 438da901a87a7e5efd37ff72b968c01c358ca4ece808da77a083605675eb6a3b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c681c1ffb8ec80a3691706ed05bd123775342b9a3d65fcbeef8ec5aa4a08b0a2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1E11883690111AEBDB01DF68C84A9EFB7B8FB06311F104455FA01E3040C338BE86CBA5
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 006B604C
                                                                                                                                                                                                                                                      • GetStockObject.GDI32(00000011), ref: 006B6060
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 006B606A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CreateMessageObjectSendStockWindow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3970641297-0
                                                                                                                                                                                                                                                      • Opcode ID: b1cf7d04436fd1b407e15104c005d543a79140cec244076eb181c2d0a7e29ab8
                                                                                                                                                                                                                                                      • Instruction ID: d269780dd1356449710b957280ad83ee81491c28810572797781c1f793bee334
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b1cf7d04436fd1b407e15104c005d543a79140cec244076eb181c2d0a7e29ab8
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0811A1B2102508BFEF125F95CD44EFA7B6AEF09364F004106FA0452120D73A9CA0DB90
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • ___BuildCatchObject.LIBVCRUNTIME ref: 006D3B56
                                                                                                                                                                                                                                                        • Part of subcall function 006D3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 006D3AD2
                                                                                                                                                                                                                                                        • Part of subcall function 006D3AA3: ___AdjustPointer.LIBCMT ref: 006D3AED
                                                                                                                                                                                                                                                      • _UnwindNestedFrames.LIBCMT ref: 006D3B6B
                                                                                                                                                                                                                                                      • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 006D3B7C
                                                                                                                                                                                                                                                      • CallCatchBlock.LIBVCRUNTIME ref: 006D3BA4
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 737400349-0
                                                                                                                                                                                                                                                      • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                                                                                                                                                                                      • Instruction ID: 217eff2915417b57b57933b635f3cf55f6045c66385598f6622b4ee9f6de400c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1F012932900148BBDF125F95CC46EEB3B6AEF58794F04401AFE4856321C732E961EBA5
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,006B13C6,00000000,00000000,?,006E301A,006B13C6,00000000,00000000,00000000,?,006E328B,00000006,FlsSetValue), ref: 006E30A5
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,006E301A,006B13C6,00000000,00000000,00000000,?,006E328B,00000006,FlsSetValue,00752290,FlsSetValue,00000000,00000364,?,006E2E46), ref: 006E30B1
                                                                                                                                                                                                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,006E301A,006B13C6,00000000,00000000,00000000,?,006E328B,00000006,FlsSetValue,00752290,FlsSetValue,00000000), ref: 006E30BF
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: LibraryLoad$ErrorLast
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3177248105-0
                                                                                                                                                                                                                                                      • Opcode ID: 23ff62d0855aeb1add960c218bc643c026c902449acdfebdc05eebe3d17f5e3f
                                                                                                                                                                                                                                                      • Instruction ID: 38949c27ebf04d83a129cb4ab8ea0d6cb1d5b8d8d768103e2cc2d1448f9df9b9
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 23ff62d0855aeb1add960c218bc643c026c902449acdfebdc05eebe3d17f5e3f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B9012036303372ABCB318B7B9C4C9A77799AF46771B204621F905D7340C725D901C6E4
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 0071747F
                                                                                                                                                                                                                                                      • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00717497
                                                                                                                                                                                                                                                      • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 007174AC
                                                                                                                                                                                                                                                      • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 007174CA
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Type$Register$FileLoadModuleNameUser
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1352324309-0
                                                                                                                                                                                                                                                      • Opcode ID: 1f06d14e3caf7ad8842e944a7fc37a058d1cc571bd96124ca8c49903c65a55f6
                                                                                                                                                                                                                                                      • Instruction ID: ca9e51f99fcc8b08cf68659c8cc32397a6a9a28a7fd88f5213a80cfe99583821
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1f06d14e3caf7ad8842e944a7fc37a058d1cc571bd96124ca8c49903c65a55f6
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CE11A1B52063549BE7208F5CDD08BD27FFCEB00B10F10856AAA56D6191D778E984DB50
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0071ACD3,?,00008000), ref: 0071B0C4
                                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0071ACD3,?,00008000), ref: 0071B0E9
                                                                                                                                                                                                                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0071ACD3,?,00008000), ref: 0071B0F3
                                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0071ACD3,?,00008000), ref: 0071B126
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CounterPerformanceQuerySleep
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2875609808-0
                                                                                                                                                                                                                                                      • Opcode ID: 890e59eee227314297ab8b35748ede0f29020ddd6b4e057449e1bfd2ddb37a3e
                                                                                                                                                                                                                                                      • Instruction ID: 9a1afa3c92f31aefc618a33f4d6ec7ecf3781dbbd85bc53a44793bbd75275764
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 890e59eee227314297ab8b35748ede0f29020ddd6b4e057449e1bfd2ddb37a3e
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 99116171C0151CE7CF009FE8D9596FEBB78FF0A711F11808AD951B2181CB389A909B55
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00747E33
                                                                                                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 00747E4B
                                                                                                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 00747E6F
                                                                                                                                                                                                                                                      • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00747E8A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ClientRectScreen$InvalidateWindow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 357397906-0
                                                                                                                                                                                                                                                      • Opcode ID: 2c7049a44d172a931365d39e808c211e0ec4d54b21568509894b45384fbb76f7
                                                                                                                                                                                                                                                      • Instruction ID: d11ede347ae8e720a9295574722d6fff409826e3ceea58d8c513f7c74b06677b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2c7049a44d172a931365d39e808c211e0ec4d54b21568509894b45384fbb76f7
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 251153B9D0020AAFDB41CF98C884AEEBBF9FF09310F509166E915E3210D735AA54CF95
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00712DC5
                                                                                                                                                                                                                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 00712DD6
                                                                                                                                                                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 00712DDD
                                                                                                                                                                                                                                                      • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00712DE4
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2710830443-0
                                                                                                                                                                                                                                                      • Opcode ID: 811e1963b461a6ba2e0b25614e8a044efbaf5e02ddf2a79b8cb38106af4f1817
                                                                                                                                                                                                                                                      • Instruction ID: 4458b17f4b3ba2ed9b65f4a6395868178d69e9573b60b904ce87e7c4115838eb
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 811e1963b461a6ba2e0b25614e8a044efbaf5e02ddf2a79b8cb38106af4f1817
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A1E092752022287BD7211BB6EC0EFEB3E6CEF43BA1F018016F105D10C19BA8C881C6B2
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006C9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 006C9693
                                                                                                                                                                                                                                                        • Part of subcall function 006C9639: SelectObject.GDI32(?,00000000), ref: 006C96A2
                                                                                                                                                                                                                                                        • Part of subcall function 006C9639: BeginPath.GDI32(?), ref: 006C96B9
                                                                                                                                                                                                                                                        • Part of subcall function 006C9639: SelectObject.GDI32(?,00000000), ref: 006C96E2
                                                                                                                                                                                                                                                      • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00748887
                                                                                                                                                                                                                                                      • LineTo.GDI32(?,?,?), ref: 00748894
                                                                                                                                                                                                                                                      • EndPath.GDI32(?), ref: 007488A4
                                                                                                                                                                                                                                                      • StrokePath.GDI32(?), ref: 007488B2
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1539411459-0
                                                                                                                                                                                                                                                      • Opcode ID: 646f3ce1740c53a29f6ae19eed8469db91d680e9c8fe9417a1cce3fe241c33ca
                                                                                                                                                                                                                                                      • Instruction ID: e99c9a0d1903c2a30d60196c698bdb1aff11a9d21047b2f5096547ce3bb9d0f2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 646f3ce1740c53a29f6ae19eed8469db91d680e9c8fe9417a1cce3fe241c33ca
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 13F03A3A042258BAEB535F94AC09FDE3A59AF06310F54C101FA11651E2C7795511CBAD
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetSysColor.USER32(00000008), ref: 006C98CC
                                                                                                                                                                                                                                                      • SetTextColor.GDI32(?,?), ref: 006C98D6
                                                                                                                                                                                                                                                      • SetBkMode.GDI32(?,00000001), ref: 006C98E9
                                                                                                                                                                                                                                                      • GetStockObject.GDI32(00000005), ref: 006C98F1
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Color$ModeObjectStockText
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 4037423528-0
                                                                                                                                                                                                                                                      • Opcode ID: 21318a7cda3f706ac3b4a32e02bca9cc3f6231497f528a50c46019a943bb9ca4
                                                                                                                                                                                                                                                      • Instruction ID: a5518ed5b51a89fffab703f3af86e8b63842024b0395e599f84f69b5c5bd246a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 21318a7cda3f706ac3b4a32e02bca9cc3f6231497f528a50c46019a943bb9ca4
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E8E0ED35640284EAEB220B34AC08BE83F60EB02332F04C31AF6FA580E1C7794650CB20
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetCurrentThread.KERNEL32 ref: 00711634
                                                                                                                                                                                                                                                      • OpenThreadToken.ADVAPI32(00000000,?,?,?,007111D9), ref: 0071163B
                                                                                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,007111D9), ref: 00711648
                                                                                                                                                                                                                                                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,007111D9), ref: 0071164F
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CurrentOpenProcessThreadToken
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3974789173-0
                                                                                                                                                                                                                                                      • Opcode ID: 32188f3f2068c99f557e17dde1506ceb6bde373229bd203d855ff150835751d9
                                                                                                                                                                                                                                                      • Instruction ID: 7fd2e17f672ec9235ec145b8810f029089450276101d17eed877bff17f2daf4f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 32188f3f2068c99f557e17dde1506ceb6bde373229bd203d855ff150835751d9
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D8E04F356022119BD7A01FA49E0DB863B78AF46791F158809F345C90A0DB6C44808B58
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 0070D858
                                                                                                                                                                                                                                                      • GetDC.USER32(00000000), ref: 0070D862
                                                                                                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0070D882
                                                                                                                                                                                                                                                      • ReleaseDC.USER32(?), ref: 0070D8A3
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2889604237-0
                                                                                                                                                                                                                                                      • Opcode ID: 8552ed186f19d25d9fb6517fe80c91185c783995045db38c4afab1a3faccbd84
                                                                                                                                                                                                                                                      • Instruction ID: faa35a145544b3cd0f569de133e4c01535bda8a804f287bd7d9cdbd14e28cd8f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8552ed186f19d25d9fb6517fe80c91185c783995045db38c4afab1a3faccbd84
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D9E01AB8801204DFCB929FA0D808A6DBBB6FB09310F11C05AF806E7260C73C8941AF45
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 0070D86C
                                                                                                                                                                                                                                                      • GetDC.USER32(00000000), ref: 0070D876
                                                                                                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0070D882
                                                                                                                                                                                                                                                      • ReleaseDC.USER32(?), ref: 0070D8A3
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2889604237-0
                                                                                                                                                                                                                                                      • Opcode ID: 6e8d7946be8133993404a151731447d0954c85f3ddff549de94efac8512a84a9
                                                                                                                                                                                                                                                      • Instruction ID: 5fcfd1e2006b78ac14406d3e765243db0d65d0f86b15f9c3254f802dfd628400
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6e8d7946be8133993404a151731447d0954c85f3ddff549de94efac8512a84a9
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 88E01AB8801200DFCB929FA0D80866DBBB6FB08310B11C04AF906E7260C73C99019F45
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006B7620: _wcslen.LIBCMT ref: 006B7625
                                                                                                                                                                                                                                                      • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00724ED4
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Connection_wcslen
                                                                                                                                                                                                                                                      • String ID: *$LPT
                                                                                                                                                                                                                                                      • API String ID: 1725874428-3443410124
                                                                                                                                                                                                                                                      • Opcode ID: 63cea8ce1b03a50d8e43bbeca787b2b143ede141077e44d7b7106715f02c5088
                                                                                                                                                                                                                                                      • Instruction ID: 87ac5c36127ee9db92d0fe3d90362a8274f71ba75620ab8f62fe2280f4b5bf89
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 63cea8ce1b03a50d8e43bbeca787b2b143ede141077e44d7b7106715f02c5088
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CF917175A002149FDB14DF58D584EA9BBF1BF84304F19809DE40A9F3A2D735EE85CB91
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • __startOneArgErrorHandling.LIBCMT ref: 006DE30D
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorHandling__start
                                                                                                                                                                                                                                                      • String ID: pow
                                                                                                                                                                                                                                                      • API String ID: 3213639722-2276729525
                                                                                                                                                                                                                                                      • Opcode ID: c3de87d80be4f79a38e86faee7335ff2b4c7d701768a7c2101a967a1e6f2f0fd
                                                                                                                                                                                                                                                      • Instruction ID: a6f462991ef1baa527095ccfca9c0c294099769a9018a4436b45c536495b1202
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c3de87d80be4f79a38e86faee7335ff2b4c7d701768a7c2101a967a1e6f2f0fd
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 66518F61E0D34296CB157715DD013F93BABDF40741F30899AE0D54A3E9EB368C929A8A
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CharUpperBuffW.USER32(0070569E,00000000,?,0074CC08,?,00000000,00000000), ref: 007378DD
                                                                                                                                                                                                                                                        • Part of subcall function 006B6B57: _wcslen.LIBCMT ref: 006B6B6A
                                                                                                                                                                                                                                                      • CharUpperBuffW.USER32(0070569E,00000000,?,0074CC08,00000000,?,00000000,00000000), ref: 0073783B
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: BuffCharUpper$_wcslen
                                                                                                                                                                                                                                                      • String ID: <sw
                                                                                                                                                                                                                                                      • API String ID: 3544283678-407046988
                                                                                                                                                                                                                                                      • Opcode ID: 072c729fb563e0269b41fb85013de5102485013c6aaf5b14ab450dbe3a0a3cbc
                                                                                                                                                                                                                                                      • Instruction ID: f8e8995ea0f71b9bc8b2d5dcbbd5e6d4d2e993c6bd0421050fd3e0b845e0668d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 072c729fb563e0269b41fb85013de5102485013c6aaf5b14ab450dbe3a0a3cbc
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A5615EB2914128EADF58EBE4CC91DFDB3B5BF14300F444129F542A7192EF386A85DBA4
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: #
                                                                                                                                                                                                                                                      • API String ID: 0-1885708031
                                                                                                                                                                                                                                                      • Opcode ID: fd4ff5a0d3af0f9d3f5e35c6ab0280af87510b39c12aa31534b66ad1e05ecb26
                                                                                                                                                                                                                                                      • Instruction ID: 3106c0aac32cfbfc0dc4272646a10b6a9906d8d292d0b76a2729b9776dd5583b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: fd4ff5a0d3af0f9d3f5e35c6ab0280af87510b39c12aa31534b66ad1e05ecb26
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CD513675600246DFDB29DF28C081BFA7BF6EF15310F248559E8919B2C0D7389E42CBA0
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000), ref: 006CF2A2
                                                                                                                                                                                                                                                      • GlobalMemoryStatusEx.KERNEL32(?), ref: 006CF2BB
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: GlobalMemorySleepStatus
                                                                                                                                                                                                                                                      • String ID: @
                                                                                                                                                                                                                                                      • API String ID: 2783356886-2766056989
                                                                                                                                                                                                                                                      • Opcode ID: 6bd607f2af1b2dffddb5a450d1e6821317907104c96cc49aad0f38ff22f192ea
                                                                                                                                                                                                                                                      • Instruction ID: 0ff0decb43e7dc4ab508df73f16f3a8b4d16c145c3df29244664cbda75609256
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6bd607f2af1b2dffddb5a450d1e6821317907104c96cc49aad0f38ff22f192ea
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1C5125B14087449BD360AF10D886BABBBF9FFC4310F81885DF199811A5EB709569CB6A
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 007357E0
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 007357EC
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: BuffCharUpper_wcslen
                                                                                                                                                                                                                                                      • String ID: CALLARGARRAY
                                                                                                                                                                                                                                                      • API String ID: 157775604-1150593374
                                                                                                                                                                                                                                                      • Opcode ID: 7cbad970585b1bd9cd3004504674f60d9db2e359c2334e04b5b52647072a13ac
                                                                                                                                                                                                                                                      • Instruction ID: a0b2cd7153f685f66ab05f2ec37ef40dd338c7b3d11b250ffa254c8e3dfa6250
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7cbad970585b1bd9cd3004504674f60d9db2e359c2334e04b5b52647072a13ac
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C9418D71A00209DFDB14DFA9C8859FEBBB5EF59320F10806DE505A7292E7389D81CBA0
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 0072D130
                                                                                                                                                                                                                                                      • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0072D13A
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CrackInternet_wcslen
                                                                                                                                                                                                                                                      • String ID: |
                                                                                                                                                                                                                                                      • API String ID: 596671847-2343686810
                                                                                                                                                                                                                                                      • Opcode ID: b5db48b026c068da9ca7484e5a936f618d68f64c363cf1c76522ffe9c3e042f2
                                                                                                                                                                                                                                                      • Instruction ID: 2a398cf6cc11a9f87ffcb93634e4b251c39ab0cfdb7a0dc2ad37d6c8c5403332
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b5db48b026c068da9ca7484e5a936f618d68f64c363cf1c76522ffe9c3e042f2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BE315071D00219AFCF55EFA4DC85AEE7FBAFF04304F100019F915A6162E735A956CB54
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • DestroyWindow.USER32(?,?,?,?), ref: 00743621
                                                                                                                                                                                                                                                      • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0074365C
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$DestroyMove
                                                                                                                                                                                                                                                      • String ID: static
                                                                                                                                                                                                                                                      • API String ID: 2139405536-2160076837
                                                                                                                                                                                                                                                      • Opcode ID: 218fdbd3a859a7d28a7cea5987cca409a0587afdfca2d417ee2ceb097dd5756b
                                                                                                                                                                                                                                                      • Instruction ID: af4ef99cd26250a427f487070544580240edf054a143ee653a9b65a8cf701de6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 218fdbd3a859a7d28a7cea5987cca409a0587afdfca2d417ee2ceb097dd5756b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B0318B71100204AAEB109F38DC81EFB73A9FF88720F11861DF8A997280DB38AD91C765
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 0074461F
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00744634
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                                                                                                      • String ID: '
                                                                                                                                                                                                                                                      • API String ID: 3850602802-1997036262
                                                                                                                                                                                                                                                      • Opcode ID: 0d74d3d4a1e1341cbeafa6ae3bfe4987483ec85f24706b5ef29e60e5ea3e72ca
                                                                                                                                                                                                                                                      • Instruction ID: bc28a42118f61eba283b933808722b5daf1cdc8c679377cf2e2f4167ce5a022a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0d74d3d4a1e1341cbeafa6ae3bfe4987483ec85f24706b5ef29e60e5ea3e72ca
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 683136B4A0120A9FDF14CFA9C981BDABBB5FF09300F11406AE904AB381D774A951DF90
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0074327C
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00743287
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                                                                                                      • String ID: Combobox
                                                                                                                                                                                                                                                      • API String ID: 3850602802-2096851135
                                                                                                                                                                                                                                                      • Opcode ID: 98e047642713f3c924bbb0a71bed32f9fffb99dc9e200b2c2fc5cf20664b27d3
                                                                                                                                                                                                                                                      • Instruction ID: e3f26c7c5ff7ebb897440e1235813267033e130c049f3e2042cb25fdb6a08eae
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 98e047642713f3c924bbb0a71bed32f9fffb99dc9e200b2c2fc5cf20664b27d3
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: EC11B271300208BFFF259E54DC85EBB376AFB953A4F104129F91897290D7B99D518760
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006B600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 006B604C
                                                                                                                                                                                                                                                        • Part of subcall function 006B600E: GetStockObject.GDI32(00000011), ref: 006B6060
                                                                                                                                                                                                                                                        • Part of subcall function 006B600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 006B606A
                                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000,?), ref: 0074377A
                                                                                                                                                                                                                                                      • GetSysColor.USER32(00000012), ref: 00743794
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                                                                                                                                                                                      • String ID: static
                                                                                                                                                                                                                                                      • API String ID: 1983116058-2160076837
                                                                                                                                                                                                                                                      • Opcode ID: 740bf5e863857d2f7ebcb1f81dfc903075ffd4e481751904b70fed1296781d0b
                                                                                                                                                                                                                                                      • Instruction ID: 23c2713db3a88c90529d8ca0ec84d5fa40b4d61cbd8e851acd1e255f19f7b8a0
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 740bf5e863857d2f7ebcb1f81dfc903075ffd4e481751904b70fed1296781d0b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D31129B2610209AFDB01DFA8CC46AFA7BB8EB09314F004515F995E2250D739E8519B50
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0072CD7D
                                                                                                                                                                                                                                                      • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0072CDA6
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Internet$OpenOption
                                                                                                                                                                                                                                                      • String ID: <local>
                                                                                                                                                                                                                                                      • API String ID: 942729171-4266983199
                                                                                                                                                                                                                                                      • Opcode ID: d916f27bc88ff450df5348ecacb0e3d53a7560da535cdeefe731293c47a52e91
                                                                                                                                                                                                                                                      • Instruction ID: 117e4fcd77672dd1571c883accc5baf3cd8495700ec130cf42200a803b0d8a91
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d916f27bc88ff450df5348ecacb0e3d53a7560da535cdeefe731293c47a52e91
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1911C6753056317AD7364B669C45EFBBE6CEF237A4F004226B10983180D7789845D6F0
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetWindowTextLengthW.USER32(00000000), ref: 007434AB
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 007434BA
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: LengthMessageSendTextWindow
                                                                                                                                                                                                                                                      • String ID: edit
                                                                                                                                                                                                                                                      • API String ID: 2978978980-2167791130
                                                                                                                                                                                                                                                      • Opcode ID: 747e606118c662ead5f21dd137dd8b4d24570863844d5075eebd044cef76e4f9
                                                                                                                                                                                                                                                      • Instruction ID: 572df542c9e519475d3e8ceb7bcbee76de60757557a85dab59337bbd3349556b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 747e606118c662ead5f21dd137dd8b4d24570863844d5075eebd044cef76e4f9
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4911CE71200248AFEB528E68DC44AFB376AEF15374F608324F968931E0C739EC919B64
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006B9CB3: _wcslen.LIBCMT ref: 006B9CBD
                                                                                                                                                                                                                                                      • CharUpperBuffW.USER32(?,?,?), ref: 00716CB6
                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00716CC2
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                                                      • String ID: STOP
                                                                                                                                                                                                                                                      • API String ID: 1256254125-2411985666
                                                                                                                                                                                                                                                      • Opcode ID: d0943e978cdb8d0774c5ff5efd39c10170cadff2d05ee69d1d94ef64cb9d5a7c
                                                                                                                                                                                                                                                      • Instruction ID: 8d6ab65dbf2283e22bd8757de6d3daad6dea4ef3368f9011c3124fab41c68ad3
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d0943e978cdb8d0774c5ff5efd39c10170cadff2d05ee69d1d94ef64cb9d5a7c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3A01C432B005268BCB21AFBDDC909FF77B5EA617107500929E852961D0EB39E980C7A0
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006B9CB3: _wcslen.LIBCMT ref: 006B9CBD
                                                                                                                                                                                                                                                        • Part of subcall function 00713CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00713CCA
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00711D4C
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                                      • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                      • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                                      • Opcode ID: 3959537b629a2537abc11ba282270cf3dd5889f3587f410a69c7d7620b4b7908
                                                                                                                                                                                                                                                      • Instruction ID: 798159bfed9eae1ddc64c95605a0c29cada89cdcc4ce5845f6fef248fdd0d8e3
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3959537b629a2537abc11ba282270cf3dd5889f3587f410a69c7d7620b4b7908
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 040128B1701218AB8B08EFA8DC55CFE7779EB02350B500919F9725B2D1EA385988C770
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006B9CB3: _wcslen.LIBCMT ref: 006B9CBD
                                                                                                                                                                                                                                                        • Part of subcall function 00713CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00713CCA
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000180,00000000,?), ref: 00711C46
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                                      • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                      • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                                      • Opcode ID: 104342efc0b900ee2000cd730e980d5cd63b00dd9d0c407b543be1895e0e6ff0
                                                                                                                                                                                                                                                      • Instruction ID: a2c82ad96f38ecd333182d9dfef2e8cdaff99fd5d619cabe404d54e37f30bce5
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 104342efc0b900ee2000cd730e980d5cd63b00dd9d0c407b543be1895e0e6ff0
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9101F7B5781108A7CF08EF94C951DFF77B89B12340F500419AA16672C1EA289E8887F5
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006B9CB3: _wcslen.LIBCMT ref: 006B9CBD
                                                                                                                                                                                                                                                        • Part of subcall function 00713CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00713CCA
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000182,?,00000000), ref: 00711CC8
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                                      • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                      • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                                      • Opcode ID: cff864fcbd80918889e09a2ae58e9e51380aee5c40f98f6812f739cfb55a7117
                                                                                                                                                                                                                                                      • Instruction ID: ad4c3b1e87b917d267962e732f65359394a0fa32eed462034af28be4c89145f2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: cff864fcbd80918889e09a2ae58e9e51380aee5c40f98f6812f739cfb55a7117
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C101D6F568111867CF04EFA8CA41EFF77A89B12380F540419BA06772C1EA689F88C7F5
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • __Init_thread_footer.LIBCMT ref: 006CA529
                                                                                                                                                                                                                                                        • Part of subcall function 006B9CB3: _wcslen.LIBCMT ref: 006B9CBD
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Init_thread_footer_wcslen
                                                                                                                                                                                                                                                      • String ID: ,%x$3yp
                                                                                                                                                                                                                                                      • API String ID: 2551934079-2889311038
                                                                                                                                                                                                                                                      • Opcode ID: dc48f5cc4255deb78e24b7f95670392888928fb9f8f745736deb4bf589fb811b
                                                                                                                                                                                                                                                      • Instruction ID: fd711dd4a796c346e99a2af753f519ebe854cc69f11b7ec48b612937d38cbdf0
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: dc48f5cc4255deb78e24b7f95670392888928fb9f8f745736deb4bf589fb811b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 93012431A8021897C504F3E89C57FBD3366DB04714F90806CF601573C2DE549D428B9A
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006B9CB3: _wcslen.LIBCMT ref: 006B9CBD
                                                                                                                                                                                                                                                        • Part of subcall function 00713CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00713CCA
                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00711DD3
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                                      • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                      • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                                      • Opcode ID: 0c34d8a0e86cbc75f878a559a088d5e6ea501dfe898067ac1c6b2618622b0b1f
                                                                                                                                                                                                                                                      • Instruction ID: 8da0d0356d02f3196a1d0d5500790874686197fab496cf1b8ae800e1e8a71ed6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0c34d8a0e86cbc75f878a559a088d5e6ea501dfe898067ac1c6b2618622b0b1f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6BF02DB1B4121867CB04F7A8DC51FFF7778AB02740F440D19B962672C1EB68594883B4
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00783018,0078305C), ref: 007481BF
                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32 ref: 007481D1
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CloseCreateHandleProcess
                                                                                                                                                                                                                                                      • String ID: \0x
                                                                                                                                                                                                                                                      • API String ID: 3712363035-461357371
                                                                                                                                                                                                                                                      • Opcode ID: 95f75288e2dc42d1478353055180f943d66334a98913096b8bb7cc40f44097a2
                                                                                                                                                                                                                                                      • Instruction ID: 877d899ccf4036572ac7d4a99037a8459d0dfc444609c1beea961de2b7fa005e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 95f75288e2dc42d1478353055180f943d66334a98913096b8bb7cc40f44097a2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C5F054B1680304BAF2606B69AC45F773A5DDB05B54F108426BB08D51A1D67E9A0093BD
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: _wcslen
                                                                                                                                                                                                                                                      • String ID: 3, 3, 16, 1
                                                                                                                                                                                                                                                      • API String ID: 176396367-3042988571
                                                                                                                                                                                                                                                      • Opcode ID: f45031534be1af5a68a1e65e2d495474e0c3d0961bfaadae1804cff3e6076cd6
                                                                                                                                                                                                                                                      • Instruction ID: 360d39f43f858df81b4870cf2fd196b8e7e556e98f2db8bbf1e44a812154d2e3
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f45031534be1af5a68a1e65e2d495474e0c3d0961bfaadae1804cff3e6076cd6
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8CE02B826043A061A279137A9CC197F578ACFC9790B10182FF9C5C6367EEA89D91D3E4
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00710B23
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Message
                                                                                                                                                                                                                                                      • String ID: AutoIt$Error allocating memory.
                                                                                                                                                                                                                                                      • API String ID: 2030045667-4017498283
                                                                                                                                                                                                                                                      • Opcode ID: 43aec69ad5c955553a5378dddc9d07acd2a08cf29de70efdf485ae5b527901af
                                                                                                                                                                                                                                                      • Instruction ID: c1035ce349ee6a431ce7d1d75bb0545d7a402b451510614c768ff913ad40dce2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 43aec69ad5c955553a5378dddc9d07acd2a08cf29de70efdf485ae5b527901af
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 03E0927128531837D2913794AC03FD97B86CF05B50F10442EF748555C38BE5689046ED
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                        • Part of subcall function 006CF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,006D0D71,?,?,?,006B100A), ref: 006CF7CE
                                                                                                                                                                                                                                                      • IsDebuggerPresent.KERNEL32(?,?,?,006B100A), ref: 006D0D75
                                                                                                                                                                                                                                                      • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,006B100A), ref: 006D0D84
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 006D0D7F
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                                                                                                                                                                                                      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                                                                                                                                                                                      • API String ID: 55579361-631824599
                                                                                                                                                                                                                                                      • Opcode ID: eaccf5bd93a6828029516516ff45bed6185574a28787e02ab76278a9bbe72c31
                                                                                                                                                                                                                                                      • Instruction ID: d0fc6e27288e6cf2a14ba077feebf8c9e7bc9274ccbbab2f33bb3c6f1c5fd561
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: eaccf5bd93a6828029516516ff45bed6185574a28787e02ab76278a9bbe72c31
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7EE06DB46003118BE3A0AFB8E8047827BE6BF04741F00892FE482C6751DBF8E4448BA5
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • __Init_thread_footer.LIBCMT ref: 006CE3D5
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Init_thread_footer
                                                                                                                                                                                                                                                      • String ID: 0%x$8%x
                                                                                                                                                                                                                                                      • API String ID: 1385522511-415883279
                                                                                                                                                                                                                                                      • Opcode ID: 9c018a40a1998f8330142128940fc285b35a0655d2b05371a03d063cc9904108
                                                                                                                                                                                                                                                      • Instruction ID: ec3e1ba3f0825dc9d757712fe2247146231e5cb59e620d88b5a0e93e5ac6af8c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9c018a40a1998f8330142128940fc285b35a0655d2b05371a03d063cc9904108
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8CE026318D8990CBCA04A798B85CFA833B7EB0A321B2041FDE006876D3DB393943874C
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 0072302F
                                                                                                                                                                                                                                                      • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00723044
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Temp$FileNamePath
                                                                                                                                                                                                                                                      • String ID: aut
                                                                                                                                                                                                                                                      • API String ID: 3285503233-3010740371
                                                                                                                                                                                                                                                      • Opcode ID: edf2a9920c037e915d76ce04af241efb504f6c20812be43801251fe8023d4654
                                                                                                                                                                                                                                                      • Instruction ID: 46f4615d314129eea6799226db1870f02237e7ee7ac774325b91f63b8c7086a4
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: edf2a9920c037e915d76ce04af241efb504f6c20812be43801251fe8023d4654
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5DD05EB654132867DA60A7A4AC0EFCB3A6CEB05750F0042A2B655E6091DBF89984CAD8
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: LocalTime
                                                                                                                                                                                                                                                      • String ID: %.3d$X64
                                                                                                                                                                                                                                                      • API String ID: 481472006-1077770165
                                                                                                                                                                                                                                                      • Opcode ID: 9e4b403e8397f2418929a7dd3948dd7087ce7664625d736b4219be46307fca8e
                                                                                                                                                                                                                                                      • Instruction ID: 5267befdfbc92bcc266b6d4e456e7f7d353bd9e558c99fbfe81d7d24db2e3449
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9e4b403e8397f2418929a7dd3948dd7087ce7664625d736b4219be46307fca8e
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D2D012A1809318EACBA097D0CC49DB9B3FDFB08341F508566F90A92080D76CCD08AB65
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0074236C
                                                                                                                                                                                                                                                      • PostMessageW.USER32(00000000), ref: 00742373
                                                                                                                                                                                                                                                        • Part of subcall function 0071E97B: Sleep.KERNEL32 ref: 0071E9F3
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FindMessagePostSleepWindow
                                                                                                                                                                                                                                                      • String ID: Shell_TrayWnd
                                                                                                                                                                                                                                                      • API String ID: 529655941-2988720461
                                                                                                                                                                                                                                                      • Opcode ID: 05ed3bf375ead76cd3cb654722000cad3d8da4fa4d522edd1ccf89fdcb98116b
                                                                                                                                                                                                                                                      • Instruction ID: bd3ea0114958b268b2bd52d3ed6c53fc82e164f916ea171d7a60dcba574a09ac
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 05ed3bf375ead76cd3cb654722000cad3d8da4fa4d522edd1ccf89fdcb98116b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0FD0A976382300BAE6A8A3309C0FFCAA6149B02B00F0089127706AA0D0CAA8B8008A48
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0074232C
                                                                                                                                                                                                                                                      • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0074233F
                                                                                                                                                                                                                                                        • Part of subcall function 0071E97B: Sleep.KERNEL32 ref: 0071E9F3
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FindMessagePostSleepWindow
                                                                                                                                                                                                                                                      • String ID: Shell_TrayWnd
                                                                                                                                                                                                                                                      • API String ID: 529655941-2988720461
                                                                                                                                                                                                                                                      • Opcode ID: 1cf72bca060485f80bd38a5bbb67b0ef29dd70e929e59b348aa50c18b543f509
                                                                                                                                                                                                                                                      • Instruction ID: 15381b4803fbf9282a30b558dc54feca417c9961b3f413c58cfbc5792bccf25c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1cf72bca060485f80bd38a5bbb67b0ef29dd70e929e59b348aa50c18b543f509
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F6D0227A381300B7E6A8B330DC0FFCABA149B01B00F00C913770AAA0D0CAF8B800CA48
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 006EBE93
                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 006EBEA1
                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 006EBEFC
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1745474304.00000000006B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006B0000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745310696.00000000006B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.000000000074C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745557899.0000000000772000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745607755.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1745632258.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ByteCharMultiWide$ErrorLast
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1717984340-0
                                                                                                                                                                                                                                                      • Opcode ID: 0f8f1f9521d0148104d8dc930527798a7a4ada707e59f2d13b0fdcf541389cc1
                                                                                                                                                                                                                                                      • Instruction ID: 5d6206b32af7b5aa28c9b50f343b3bf2f085562192ecaeb1110c0c0889a0c4ac
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0f8f1f9521d0148104d8dc930527798a7a4ada707e59f2d13b0fdcf541389cc1
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B841E734602386AFCF218FA6CC44AFB7BA6AF41350F149169F959573A1DB308D01CB65